WorldWideScience

Sample records for information operations io

  1. Creating Feedback Channels With Optical Communications For Information Operations (IO)

    Science.gov (United States)

    2016-06-01

    address, it could potentially tie your IP address to your identity,” which then allows companies like Google to track your personal Internet usage ...estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services... Internet advertising campaigns incorporated into the continuous Observe, Orient, Decide, Act (OODA) loop decision-making process of IO practitioners

  2. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  3. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    National Research Council Canada - National Science Library

    Chilton, Dan

    2008-01-01

    .... must re-focus its efforts on Information Operations to achieve GWOT objectives. In an environment where rapidly advancing technology is drastically improving the individual's ability to conduct IO against the U.S...

  4. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    Science.gov (United States)

    2008-03-01

    concepts, relevant to IO, which are known successful marketing practices. Successful marketing strategy includes the basic “ 4Ps of marketing ...OPERATIONS VERSUS CIVILIAN MARKETING AND ADVERTISING: A COMPARATIVE ANALYSIS TO IMPROVE IO PLANNING AND STRATEGY by Dan Chilton March 2008...REPORT DATE March 2008 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Information Operations Versus Civilian Marketing and

  5. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  6. Information Operations: Where Next?

    National Research Council Canada - National Science Library

    Buchholz, David R

    2005-01-01

    ... (DoD) information operations. Doctrine already addresses the issue of combatant commander responsibility for ensuring that IO is planned and executed in the respective commands, but an IO vacuum exists with respect...

  7. IO Sphere: The Professional Journal of Joint Information Operations. Special Edition 2008

    Science.gov (United States)

    2008-01-01

    regenerate the Iraqi Army. Deaths of Western alliance soldiers and Iraqi civilians keep mounting, reaching a level where public opinions in Coalition...examples of the innovative and effective use of information warfare as a war winning effort. The announcement of the death of Ashwathama amidst the...Caucasus region, focusing on those connected with economical and political interests. This author is creating what can be called a ‘ semiotic model

  8. Information Operations: Where Next?

    National Research Council Canada - National Science Library

    Buchholz, David R

    2005-01-01

    ... to standardized IO training and integration across the combatant commands. For this reason and others there is a compelling argument for the major responsibility for DoD information operations integration to fall under the control of U.S...

  9. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  10. Organizing Joint Forces for Information Operations: The Viability of a Joint Force Information Operations Component Commander

    National Research Council Canada - National Science Library

    Seinwill, Jeffrey

    1999-01-01

    ...) as the best way to integrate information operations (IO) into joint forces. Though attractive on the surface, detailed investigation demonstrates that the JFIOCC is not a viable structure for joint force IO...

  11. Preparing the American Soldier in a Brigade Combat Team to Conduct Information Operations in the Contemporary Operational Environment

    National Research Council Canada - National Science Library

    Beckno, Brian T

    2006-01-01

    ...) to conduct Information Operations (IO) in the Contemporary Operational Environment (COE). First, an explanation of IO and its Army applicability is presented using current examples from military operations in Operation Iraqi Freedom (OIF...

  12. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  13. DoD Information Operations Center for Research

    OpenAIRE

    2012-01-01

    This memorandum cancels Deputy Secretary of Defense Memorandum, "Information Operations Center of Excellence," dated Septembet 3, 2004, and redesignates the Naval Postgraduate's School (NPS), Information Operations (IO) Center of Excellence, as the DoD Information Operations Cetner for Research. As the DoD Information Operations Center for Research, the NPS shall provide graduate-level IO education and facilitate the exploration of new IO concepts, research, analysis, and field experimentation.

  14. Scenario Development for Information Operations (IO) Experimentation

    Science.gov (United States)

    2003-07-10

    country called DYSLEXIA , whose government has been making threats to invade and appropriate a region of its neighbouring country, ABSTEMIA, which is...Network Measures and Metrics 18 Conclusion Scenarios - Tailoring, Framework, Families of Scenario Experiments - Measures, Humans, Objectives Networks

  15. Information Operations Primer

    Science.gov (United States)

    2010-11-01

    competitive civil service selection process. Mr. Mark H. Johnson ( DISES ) is the Director of JIOWC, and USAR Colonel Vincent D. Crabb is the Deputy...of Public Affairs (PA), Civil -Military Operations (CMO), and Defense Support to Public Diplomacy (DSPD) contribute to the accomplishment of the IO...and internal publics with interest in the Department of Defense. 6 (2) Civil -Military Operations (CMO) are the activities of a commander that

  16. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

    OpenAIRE

    Geovandro C. C. F. Pereira; Renan C. A. Alves; Felipe L. da Silva; Roberto M. Azevedo; Bruno C. Albertini; Cíntia B. Margi

    2017-01-01

    The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system. Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or oper...

  17. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  18. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

    Directory of Open Access Journals (Sweden)

    Geovandro C. C. F. Pereira

    2017-01-01

    Full Text Available The deployment of security services over Wireless Sensor Networks (WSN and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system. Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or operating systems versions which had significant progress. Herein, we provide time and energy benchmarks of reference implementations for different platforms and operating systems and analyze their impact. Moreover, we not only give the first benchmark results of symmetric cryptography for the Intel Edison IoT platform but also describe a methodology of how to measure energy consumption on that platform.

  19. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  20. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  1. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  2. A Proposal for IoT Dynamic Routes Selection Based on Contextual Information.

    Science.gov (United States)

    Araújo, Harilton da Silva; Filho, Raimir Holanda; Rodrigues, Joel J P C; Rabelo, Ricardo de A L; Sousa, Natanael de C; Filho, José C C L S; Sobral, José V V

    2018-01-26

    The Internet of Things (IoT) is based on interconnection of intelligent and addressable devices, allowing their autonomy and proactive behavior with Internet connectivity. Data dissemination in IoT usually depends on the application and requires context-aware routing protocols that must include auto-configuration features (which adapt the behavior of the network at runtime, based on context information). This paper proposes an approach for IoT route selection using fuzzy logic in order to attain the requirements of specific applications. In this case, fuzzy logic is used to translate in math terms the imprecise information expressed by a set of linguistic rules. For this purpose, four Objective Functions (OFs) are proposed for the Routing Protocol for Low Power and Loss Networks (RPL); such OFs are dynamically selected based on context information. The aforementioned OFs are generated from the fusion of the following metrics: Expected Transmission Count (ETX), Number of Hops (NH) and Energy Consumed (EC). The experiments performed through simulation, associated with the statistical data analysis, conclude that this proposal provides high reliability by successfully delivering nearly 100% of data packets, low delay for data delivery and increase in QoS. In addition, an 30% improvement is attained in the network life time when using one of proposed objective function, keeping the devices alive for longer duration.

  3. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  4. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  5. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  6. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  7. Users of the main smartphone operating systems (iOS, Android differ only little in personality.

    Directory of Open Access Journals (Sweden)

    Friedrich M Götz

    Full Text Available The increasingly widespread use of mobile phone applications (apps as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081 and a German-speaking sample (Study 2; N = 2,438. As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five. Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows. In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1, ηp2 = .005 to .036 (Study 2, respectively and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  8. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  9. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  10. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  11. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  12. IoT Enabled Low Cost Wearable Device for Location and Information Tracking System

    Directory of Open Access Journals (Sweden)

    Kamaludin Nur Atika Binti

    2017-01-01

    Full Text Available An internet-of-things (IoT enabled low cost wearable device for location and information tracking system is developed to monitor and ensure the safety of the children while their parents are away either to work or abroad. This system aims to ensure human safety especially the children and efficiently initiate search and rescue in the event of emergencies. The device will notify the parents on the condition of the surroundings of the children, specifically inside the house and notify the parents if the children are outside the target area by using the application developed in the smartphone. The system uses a microcomputer called Beagle-Bone Black (BBB as the processor while GPS and LTE technology for wireless communication. Future improvement mainly focuses on reducing the size and power consumption of the device, improving communication module, and optimizing microcomputer’s specification.

  13. Principles of Information Operations: A Recommended Addition to U.S. Army Doctrine

    National Research Council Canada - National Science Library

    Burton, Gerald

    2003-01-01

    .... This includes establishing a common basis for conducting IO across the spectrum of conflict. Army IO doctrine must provide commanders and their staffs the foundation necessary to effectively integrate IO into full spectrum operations...

  14. Information Security Operations Centers

    Directory of Open Access Journals (Sweden)

    Natalia Georgievna Miloslavskaya

    2016-12-01

    Full Text Available At present information security (IS incidents have become not only more numerous and diverse but also more damaging and disruptive. Preventive controls based on the IS risk assessment results decrease the majority but not all the IS incidents. Therefore, an IS incident management system is necessary for rapidly detecting IS incidents, minimizing loss and destruction, mitigating the vulnerabilities that were exploited and restoring organization’s IT infrastructure (ITI, including its IT services. These systems can be implemented on the basis of a Security Operations Center (SOC. Based on the related works a survey of the existing SOCs, their mission and main functions is given. The SOCs’ classification as well as the key indicators of IS incidents in II are proposed. Some serious first-generation SOCs’ limitations are defined. This analysis leads to the main area of further research launched by the author.

  15. A reference architecture for IoT-based logistic information systems in agrifood supply chains

    NARCIS (Netherlands)

    Verdouw, C.N.; Robbemond, R.M.; Verwaart, T.; Wolfert, J.; Beulens, A.J.M.

    2015-01-01

    Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely

  16. IoT-Based Information System for Healthcare Application: Design Methodology Approach

    Directory of Open Access Journals (Sweden)

    Damian Dziak

    2017-06-01

    Full Text Available Over the last few decades, life expectancy has increased significantly. However, elderly people who live on their own often need assistance due to mobility difficulties, symptoms of dementia or other health problems. In such cases, an autonomous supporting system may be helpful. This paper proposes the Internet of Things (IoT-based information system for indoor and outdoor use. Since the conducted survey of related works indicated a lack of methodological approaches to the design process, therefore a Design Methodology (DM, which approaches the design target from the perspective of the stakeholders, contracting authorities and potential users, is introduced. The implemented solution applies the three-axial accelerometer and magnetometer, Pedestrian Dead Reckoning (PDR, thresholding and the decision trees algorithm. Such an architecture enables the localization of a monitored person within four room-zones with accuracy; furthermore, it identifies falls and the activities of lying, standing, sitting and walking. Based on the identified activities, the system classifies current activities as normal, suspicious or dangerous, which is used to notify the healthcare staff about possible problems. The real-life scenarios validated the high robustness of the proposed solution. Moreover, the test results satisfied both stakeholders and future users and ensured further cooperation with the project.

  17. Information Campaigns for Peace Operations

    Science.gov (United States)

    2000-03-01

    elections.” From the mission’s inception an information component was built in. The formal information campaign was handled by the Information and Education ...pack up and go home.”27 In that environment, the OHR strategy has been 54 Information Campaigns for Peace Operations to educate the electorate about...if people are fed a steady diet of information, they will come around 62 Information Campaigns for Peace Operations eventually,” and accept that

  18. Information Operations Primer

    Science.gov (United States)

    2011-11-01

    recognized the importance of strategic communication at the theater level in Veracruz in 1847. Realizing the influence of the Catholic Church on...Mexican society, Scott attended Mass with his staff at the Veracruz Cathedral to display the respect of U.S. forces. He further ordered U.S. soldiers to...operate freely in cyberspace. Data processing speeds and digital storage media continue to grow exponentially with competitive markets that drive sales

  19. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, L.R.; Hayes, D.W.; Hunter, C.H.; Marter, W.L.; Moyer, R.A.

    1989-12-01

    This volume is a reactor operation environmental information document for the Savannah River Plant. Topics include meteorology, surface hydrology, transport, environmental impacts, and radiation effects. 48 figs., 56 tabs. (KD)

  20. Radiation Hardened High Speed Integrated Circuits SERDES I/O for Extreme Operating Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Manned and robotic space missions require high-performance electronic control systems capable of operating for extended periods in harsh environments subject to...

  1. ?Healthcare IoT m-GreenCARDIO Remote Cardiac Monitoring System - Concept, Theory of Operation and Implementation

    Directory of Open Access Journals (Sweden)

    ZAGAN, I.

    2017-05-01

    Full Text Available Present day Internet of Things (IoT developers are inspired by the spectacular evolution in the field, and, at the same time, determined to connect an increasingly wider range of 'things', with the lowest power consumption, the wider range of action and interoperability guaranteed with excessive quality. Based on current challenges in the medical and electronic field, the present paper seeks the practical implementation of an efficient, low cost, low-power IoT medical system, yet with a greater memory autonomy. In this context, our main contribution is the implementation of a solution for ECG monitoring based on IoT techniques. This paper presents a qualitative research in the field of healthcare IoT and embedded applications meant to provide an innovative and flexible system meeting the stringent requirements of this area. Without compromising the performance intake and the low power consumption, the designers offer flexible options for connectivity and response time.

  2. Balogun, IO

    African Journals Online (AJOL)

    Balogun, IO. Vol 3, No 4 (2009) - Articles Poverty Alleviation Programmes and Economic Development in Nigeria: A Comparative Assessment of Asa and Ilorin West Local Govt. Areas of Kwara State, Nigeria Abstract PDF. ISSN: 2070-0083. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians ...

  3. Silicate volcanism on Io

    Science.gov (United States)

    Carr, M. H.

    1986-03-01

    This paper is mainly concerned with the nature of volcanic eruptions on Io, taking into account questions regarding the presence of silicates or sulfur as principal component. Attention is given to the generation of silicate magma, the viscous dissipation in the melt zone, thermal anomalies at eruption sites, and Ionian volcanism. According to the information available about Io, it appears that its volcanism and hence its surface materials are dominantly silicic. Several percent of volatile materials such as sulfur, but also including sodium- and potassium-rich materials, may also be present. The volatile materials at the surface are continually vaporized and melted as a result of the high rates of silicate volcanism.

  4. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  5. Loose-Lipped Mobile Device Intelligent Personal Assistants: A Discussion of Information Gleaned from Siri on Locked iOS Devices.

    Science.gov (United States)

    Horsman, Graeme

    2018-04-23

    The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation. © 2018 American Academy of Forensic Sciences.

  6. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  7. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose

  8. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-19

    Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through

  9. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  10. Reactor operation safety information document

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    The report contains a reactor facility description which includes K, P, and L reactor sites, structures, operating systems, engineered safety systems, support systems, and process and effluent monitoring systems; an accident analysis section which includes cooling system anomalies, radioactive materials releases, and anticipated transients without scram; a summary of onsite doses from design basis accidents; severe accident analysis (reactor core disruption); a description of operating contractor organization and emergency planning; and a summary of reactor safety evolution. (MB)

  11. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  12. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    Science.gov (United States)

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  13. Io Through Different 'Eyes'

    Science.gov (United States)

    2007-01-01

    This montage demonstrates New Horizons' ability to observe the same target in complementary ways using its diverse suite of instruments. Previously released views taken at visible and slightly longer infrared wavelengths with the Long Range Reconnaissance Imager (LORRI), New Horizons' high-resolution black-and-white camera, and the Multispectral Visible Imaging Camera (MVIC), its color camera, are here compared with a nearly simultaneous view from the Linear Etalon Imaging Spectral Array (LEISA), which observes its targets in more than 200 separate wavelengths of infrared light. This color LEISA view of Io (bottom right) combines three wavelength ranges, centered at 1.80, 2.04, and 2.31 micrometers. The LORRI image (left) shows fine details on Io's sunlit crescent and in the partially sunlit plume from the Tvashtar volcano, and reveals the bright nighttime glow of the hot lavas at the source of the Tvashtar plume. The MVIC image (top right) shows the contrasting colors of the red lava and blue plume at Tvashtar, and the sulfur and sulfur dioxide deposits on Io's sunlit surface. The LEISA image shows that the glow of the Tvashtar volcano is even more intense at infrared wavelengths and reveals the infrared glow of at least 10 fainter volcanic hot spots on the moon's nightside. The brightest of these, Amirani/Maui, which is visible to the lower right of Tvashtar, is less than 4% as bright as Tvashtar. All of these are long-lived hot spots that have been observed previously by the Galileo orbiter. Further analysis of the LEISA data will provide information on the volcanoes' temperatures, and data on the sunlit crescent of Io will reveal details of Io's surface composition. The LORRI, MVIC and LEISA images were taken March 1, 2007, at 00:35, 00:25 and 00:31 Universal Time, respectively, from a range of 2.3 million kilometers (1.4 million miles). The images are centered at Io coordinates 4 degrees south, 164 degrees west.

  14. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Haselow, J.S.; Price, V.; Stephenson, D.E.; Bledsoe, H.W.; Looney, B.B.

    1989-12-01

    The Savannah River Site (SRS) produces nuclear materials, primarily plutonium and tritium, to meet the requirements of the Department of Defense. These products have been formed in nuclear reactors that were built during 1950--1955 at the SRS. K, L, and P reactors are three of five reactors that have been used in the past to produce the nuclear materials. All three of these reactors discontinued operation in 1988. Currently, intense efforts are being extended to prepare these three reactors for restart in a manner that protects human health and the environment. To document that restarting the reactors will have minimal impacts to human health and the environment, a three-volume Reactor Operations Environmental Impact Document has been prepared. The document focuses on the impacts of restarting the K, L, and P reactors on both the SRS and surrounding areas. This volume discusses the geology, seismology, and subsurface hydrology. 195 refs., 101 figs., 16 tabs.

  15. Voyager photometry of Io

    International Nuclear Information System (INIS)

    Simonelli, D.P.

    1987-01-01

    Detailed disk-integrated and disk-resolved photometric studies of the Jovian moon Io were carried out using Voyager images. Disk-integrated properties derived from the Voyager data, such as phase curves, rotation curves, geometric albedos, phase integrals, and the Bond albedo, are generally consistent with earth-based estimates. Near-opposition limb-darkening behavior, as parameterized by the Minnaert photometric function, has been accurately measured for regions on the surface of Io in three distinct color classes: Bright (white), Average (orange), and Polar (brown). The limb-darkening results allow derivation of accurate near-opposition disk-resolved phase curves, revealing substantial differences in opposition surge among the color classes. Modeling of the phase curves using the Hapke photometric function supports the contention that the uppermost layer of the Ionian surface is on average extremely porous, and suggests that this layer is substantially more porous in Average and Polar areas than in the Bright regions, a difference consistent with models of Io's surface layer. Combination of limb-darkening and phase information leads to determination of accurate normal reflectance spectra for the color classes; careful comparison with laboratory data supports earlier claims that the spectra of Ionian materials can be explained by mixtures of sulfur and SO 2 frost, although this is not a unique diagnostic identification

  16. Developing a knowledge system for information operations

    CSIR Research Space (South Africa)

    Leenen, L

    2011-03-01

    Full Text Available and to defend one’s own interests. Corporations, governments, and military forces are facing increasing exposure to strategic information-based actions. Most national defence and security organisations regard Information Operations as both a defensive...

  17. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    educated . There were also some other points of divergence. Open source media or what some might consider “ media monitoring” was considered a...making of adversaries and potential adversaries while protecting our own (JP 3-13). The IO officer serves as the integration specialist for IO. The...purpose of the needs analysis was to determine the training, education , and/or other changes to Doctrine, Organization, Training, Materiel, Leadership

  18. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L.D.; Specht, W.L.; Mackey, H.E.; Paller, M.H.; Wilde, E.W.; Dicks, A.S.

    1989-12-01

    The Savannah River Site (SRS) is a large United States Department of Energy installation on the upper Atlantic Coastal Plain of South Carolina. The SRS contains diverse habitats, flora, and fauna. Habitats include upland terrestrial areas, varied wetlands including Carolina Bays, the Savannah River swamp system, and impoundment related and riparian wetlands, and the aquatic habitats of several stream systems, two large cooling reservoirs, and the Savannah River. These diverse habitats support a large variety of plants and animals including many commercially or recreational valuable species and several rare, threatened or endangered species. This volume describes the major habitats and their biota found on the SRS, and discuss the impacts of continued operation of the K, L, and P production reactors.

  19. IoT for Smart City Services: Lifecycle Approach

    OpenAIRE

    Hefnawy , Ahmed; Bouras , Abdelaziz; Cherifi , Chantal

    2016-01-01

    International audience; " Internet of Things " (IoT) and " Smart City " are widely recognized to address the complexity of modern city operation. Concentration of population, scarcity of resources and environmental concerns are the main challenges that face city operators, and make ordinary service provisioning less efficient. In city environment, IoT sensors can be sources of real-time data; and, IoT actuators can execute real-time actions in the physical domain. IoT systems range from domai...

  20. Occurrence reporting and processing of operations information

    International Nuclear Information System (INIS)

    1997-01-01

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (''Reportable Occurrences''); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department's performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations

  1. Occurrence reporting and processing of operations information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-21

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (``Reportable Occurrences``); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department`s performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations.

  2. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  3. IO Sphere: The Professional Journal of Joint Information Operations. December 2010

    Science.gov (United States)

    2010-12-01

    communication should be directed at print, broadcast and internet media. This makes considerable sense since the will of Western societies has...and local media environments, cyberspace, and human social networks. The weapons are stories, ideas, themes, and memes , delivered in weaponized

  4. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    National Research Council Canada - National Science Library

    Chilton, Dan

    2008-01-01

    .... and given the political and moral restrictions placed on U.S. military action, having the most powerful and technologically advanced capabilities in the world no longer guarantees success. The U.S...

  5. Volcanic features of Io

    Science.gov (United States)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    Volcanic activity is apparently higher on Io than on any other body in the Solar System. Its volcanic landforms can be compared with features on Earth to indicate the type of volcanism present on Io. ?? 1979 Nature Publishing Group.

  6. Erosional scarps on Io

    Science.gov (United States)

    McCauley, J.F.; Smith, B.A.; Soderblom, L.A.

    1979-01-01

    Irregular or fretted scarps on Io are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO2 is proposed to explain these complexly eroded terrains on Io. ?? 1979 Nature Publishing Group.

  7. Information Operations And J-3: A Perfect Union

    National Research Council Canada - National Science Library

    Patschke, Gregory

    2004-01-01

    ... on a lack of unity of command and unity of effort as primary catalysts for this failure. They proposed eliminating the IO cell concept and adopting either an IO task force or a specific IO functional component command. I disagree...

  8. Jupiter-Io Montage

    Science.gov (United States)

    2007-01-01

    This is a montage of New Horizons images of Jupiter and its volcanic moon Io, taken during the spacecraft's Jupiter flyby in early 2007. The Jupiter image is an infrared color composite taken by the spacecraft's near-infrared imaging spectrometer, the Linear Etalon Imaging Spectral Array (LEISA) at 1:40 UT on Feb. 28, 2007. The infrared wavelengths used (red: 1.59 um, green: 1.94 um, blue: 1.85 um) highlight variations in the altitude of the Jovian cloud tops, with blue denoting high-altitude clouds and hazes, and red indicating deeper clouds. The prominent bluish-white oval is the Great Red Spot. The observation was made at a solar phase angle of 75 degrees but has been projected onto a crescent to remove distortion caused by Jupiter's rotation during the scan. The Io image, taken at 00:25 UT on March 1st 2007, is an approximately true-color composite taken by the panchromatic Long-Range Reconnaissance Imager (LORRI), with color information provided by the 0.5 um ('blue') and 0.9 um ('methane') channels of the Multispectral Visible Imaging Camera (MVIC). The image shows a major eruption in progress on Io's night side, at the northern volcano Tvashtar. Incandescent lava glows red beneath a 330-kilometer high volcanic plume, whose uppermost portions are illuminated by sunlight. The plume appears blue due to scattering of light by small particles in the plume This montage appears on the cover of the Oct. 12, 2007, issue of Science magazine.

  9. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  10. Radiation Hardened High Speed Integrated Circuits Double Data Rate I/O for Extreme Operating Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Manned and robotic space missions require high-performance electronic control systems capable of operating for extended periods in harsh environments that are...

  11. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  12. Modeling decisions information fusion and aggregation operators

    CERN Document Server

    Torra, Vicenc

    2007-01-01

    Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and education, while in computer science they are particularly used in fields such as knowledge-based systems, robotics, and data mining. This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in practical applications that involve numerical information. Starting with detailed introductions to information fusion and integration, measurement and probability theory, fuzzy sets, and functional equations, the authors then cover the following topics in detail: synthesis of judgements, fuzzy measures, weighted means and fuzzy integrals, indices and evaluation methods, model selection, and parameter extraction. The method...

  13. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  14. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  15. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  16. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  17. Intelligence system for reactor operator informational support

    International Nuclear Information System (INIS)

    Prangishvili, I.V.; Pashchenko, F.F.; Saprykin, E.M.

    1989-01-01

    Problems related to creation and introduction at NPP of highly efficient and reliable systems for monitoring and control of working processes and intelligence-endowed systems of operator informational support (ISOIS) are considered. The main units included in ISOIS are considered. The main units included in ISOIS are described. The unit of current state monitoring provides information for the operator, which is necessary under concrete conditions for the process monitoring and control, so as to avoid emergencies and affers a program of actions in a dialogue mode for the operator. The identification unit is designed for the obtaining of assessed values of process parameters (neutron fields, temperatures, pressures) and basic equipment (reactivity coefficients, fuel rod weights, time of delay). The prediction unit evaluates the behaviour of process parameters and process state in various situations. 9 refs

  18. A 'Plumefall' on Io

    Science.gov (United States)

    2007-01-01

    New Horizons took this image of Jupiter's volcanic moon Io with its Long Range Reconnaissance Imager (LORRI) at 15:15 Universal Time on February 28, 2007, nearly 10 hours after the spacecraft's closest approach to Jupiter. The image is centered at Io coordinates 5 degrees south, 92 degrees west, and the spacecraft was 2.4 million kilometers (1.5 million miles) from Io. Io's diameter is 3,640 kilometers (2,262 miles). Io's dayside was deliberately overexposed in this image to bring out details on the nightside and in any volcanic plumes that might be present. Io cooperated by producing an enormous plume, 330 kilometers (200 miles) high, from the volcano Tvashtar. Near Io's north pole, Tvashtar was active throughout New Horizons' Jupiter encounter. In this image, volcanic debris from the plume, illuminated by the setting sun, rains down onto Io's nightside. Hot, glowing lava at the source of the plume is the bright point of light on the sunlit side of the terminator (the line separating day and night). Elsewhere along the terminator, mountains catch the setting sun. The nightside of Io is lit up by light reflected from Jupiter.

  19. Strategy Planning Visualization Tool (SPVT) for the Air Operations Center (AOC). Volume 2: Information Operations (IO) Planning Enhancements

    Science.gov (United States)

    2009-12-31

    these issues. Bringing to bear its resources and some time to optimize the Ontology persistence and querying capabilities, the use of these technologies...JDBC™, and Sun Microsystems® are trademarks or registered trademarks of Sun Microsystems, Inc. JBoss®, Hibernate ® and Red Hat® are registered

  20. 76 FR 58565 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-09-21

    ... AFFAIRS Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously... Enduring Freedom/Operation Iraqi Freedom veterans regarding benefits. DATES: Written comments and... techniques or the use of other forms of information technology. Title: Operation Enduring Freedom/Operation...

  1. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  2. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  3. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  4. Exploring of Wireless Technology to Provide Information Sharing Among Military, United Nations and Civilian Organizations During Complex Humanitarian Emergencies and Peacekeeping Operations

    National Research Council Canada - National Science Library

    Bridges, Douglas

    2003-01-01

    ...) and peacekeeping operations. Humanitarian emergencies and peacekeeping operations are a complex mix of related activities that require the combined efforts of the UN, military, International Organizations (IOs...

  5. 76 FR 72243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2011-11-22

    ... AFFAIRS Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans... facilities for returning Operation Enduring Freedom/ Operation Iraqi Freedom veterans and their families.... Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10...

  6. Organizing for Information Operations Within The Joint Task Force

    National Research Council Canada - National Science Library

    McLaughlin, Lawrence

    2003-01-01

    .... Joint doctrine defines information operations as a broad range of capabilities and related activities that include operations security, psychological operations, electronic warfare, physical attack...

  7. An Operational Perspective of Total Lightning Information

    Science.gov (United States)

    Nadler, David J.; Darden, Christopher B.; Stano, Geoffrey; Buechler, Dennis E.

    2009-01-01

    The close and productive collaborations between the NWS Warning and Forecast Office, the Short Term Prediction and Research Transition Center at NASA Marshall Space Flight Center and the University of Alabama in Huntsville have provided a unique opportunity for science sharing and technology transfer. One significant technology transfer that has provided immediate benefits to NWS forecast and warning operations is the use of data from the North Alabama Lightning Mapping Array. This network consists of ten VHF receivers deployed across northern Alabama and a base station located at the National Space Science and Technology Center. Preliminary investigations done at WFO Huntsville, along with other similar total lightning networks across the country, have shown distinct correlations between the time rate-of-change of total lightning and trends in intensity/severity of the parent convective cell. Since May 2003 when WFO HUN began receiving these data - in conjunction with other more traditional remotely sensed data (radar, satellite, and surface observations) -- have improved the situational awareness of the WFO staff. The use of total lightning information, either from current ground based systems or future space borne instrumentation, may substantially contribute to the NWS mission, by enhancing severe weather warning and decision-making processes. Operational use of the data has been maximized at WFO Huntsville through a process that includes forecaster training, product implementation, and post event analysis and assessments. Since receiving these data, over 50 surveys have been completed highlighting the use of total lightning information during significant events across the Tennessee Valley. In addition, around 150 specific cases of interest have been archived for collaborative post storm analysis. From these datasets, detailed trending information from radar and total lightning can be compared to corresponding damage reports. This presentation will emphasize

  8. Active Volcanic Plumes on Io

    Science.gov (United States)

    1997-01-01

    This color image, acquired during Galileo's ninth orbit around Jupiter, shows two volcanic plumes on Io. One plume was captured on the bright limb or edge of the moon (see inset at upper right), erupting over a caldera (volcanic depression) named Pillan Patera after a South American god of thunder, fire and volcanoes. The plume seen by Galileo is 140 kilometers (86 miles) high and was also detected by the Hubble Space Telescope. The Galileo spacecraft will pass almost directly over Pillan Patera in 1999 at a range of only 600 kilometers (373 miles).The second plume, seen near the terminator (boundary between day and night), is called Prometheus after the Greek fire god (see inset at lower right). The shadow of the 75-kilometer (45- mile) high airborne plume can be seen extending to the right of the eruption vent. The vent is near the center of the bright and dark rings. Plumes on Io have a blue color, so the plume shadow is reddish. The Prometheus plume can be seen in every Galileo image with the appropriate geometry, as well as every such Voyager image acquired in 1979. It is possible that this plume has been continuously active for more than 18 years. In contrast, a plume has never been seen at Pillan Patera prior to the recent Galileo and Hubble Space Telescope images.North is toward the top of the picture. The resolution is about 6 kilometers (3.7 miles) per picture element. This composite uses images taken with the green, violet and near infrared filters of the solid state imaging (CCD) system on NASA's Galileo spacecraft. The images were obtained on June 28, 1997, at a range of more than 600,000 kilometers (372,000 miles).The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http

  9. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  10. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  11. Sulphur flows on Io

    International Nuclear Information System (INIS)

    Sagan, C.

    1979-01-01

    Voyager 1 close-encounter photomosaics have clarified both the coloration of Io and its surface variation. These colour patterns seem explicable in terms of liquid sulphur produced in ionian volcanoes and solfataras and quenched at Io ambient temperatures approximately equal to 135 K. The liquid sulphur flow fronts and frozen rivers which appear in the Voyager images are discussed. It is argued that the volcanic deposition rates and the vapour pressure over sulphur melts are both consistent with the notion that the surface of Io changes significantly in geologically very short periods of time. (UK)

  12. The Linkage of Joint Operational Fires, Information Operations and the Army: Does the Army Have Effective Feedback Mechanisms that Integrate Operational Fires (Physical Destruction) and Information Operations?

    National Research Council Canada - National Science Library

    Mills, Charles

    2004-01-01

    The information revolution seems to hold a lot of promise to the U.S. economy and the U.S. military, but rigid bureaucratic hierarchies make it extremely difficult for effective integration of operational fires and information operations...

  13. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  14. The Design of the NetBSD I/O Subsystems

    OpenAIRE

    Chung, SungWon

    2016-01-01

    This book describes the source code of the NetBSD Operating System Release 1.6 in SUN UltraSPARC 64-bit platform by annotating related excerpts from references and user manuals on the NetBSD Operating System. The goal of this book is to provide necessary information to understand the operation and the implementation of I/O subsystems in the kernel as well as to design and implement a new filesystem on the NetBSD platform.

  15. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  16. Io and Ganymede

    Science.gov (United States)

    2007-01-01

    The New Horizons Long Range Reconnaissance Imager (LORRI) took this 4-millisecond exposure of Jupiter and two of its moons at 01:41:04 UTC on January 17, 2007. The spacecraft was 68.5 million kilometers (42.5 million miles) from Jupiter, closing in on the giant planet at 41,500 miles (66,790 kilometers) per hour. The volcanic moon Io is the closest planet to the right of Jupiter; the icy moon Ganymede is to Io's right. The shadows of each satellite are visible atop Jupiter's clouds; Ganymede's shadow is draped over Jupiter's northwestern limb. Ganymede's average orbit distance from Jupiter is about 1.07 million kilometers (620,000 miles); Io's is 422,000 kilometers (262,000 miles). Both Io and Ganymede are larger than Earth's moon; Ganymede is larger than the planet Mercury.

  17. Io in Eclipse

    Science.gov (United States)

    2007-01-01

    This unusual image shows Io glowing in the darkness of Jupiter's shadow. It is a combination of eight images taken by the New Horizons Long Range Reconnaissance Imager (LORRI) between 14:25 and 14:55 Universal Time on February 27, 2007, about 15 hours before the spacecraft's closest approach to Jupiter. North is at the top of the image. Io's surface is invisible in the darkness, but the image reveals glowing hot lava, auroral displays in Io's tenuous atmosphere and volcanic plumes across the moon. The three bright points of light on the right side of Io are incandescent lava at active volcanoes - Pele and Reiden (south of the equator), and a previously unknown volcano near 22 degrees north, 233 degrees west near the edge of the disk at the 2 o'clock position. An auroral glow, produced as intense radiation from Jupiter's magnetosphere bombards Io's atmosphere, outlines the edge of the moon's disk. The glow is patchy because the atmosphere itself is patchy, being denser over active volcanoes. In addition to the near-surface glow, there is a remarkable auroral glow suspended 330 kilometers (200 miles) above the edge of the disk at the 2 o'clock position; perhaps this glowing gas was ejected from the new volcano below it. Another glowing gas plume, above a fainter point of light, is visible just inside Io's disk near the 6 o'clock position; this plume is above another new volcanic eruption discovered by New Horizons. On the left side of the disk, near Io's equator, a cluster of faint dots of light is centered near the point on Io that always faces Jupiter. This is the region where electrical currents connect Io to Jupiter's magnetosphere. It is likely that electrical connections to individual volcanoes are causing the glows seen here, though the details are mysterious. Total exposure time for this image was 16 seconds. The range to Io was 2.8 million kilometers (1.7 million miles), and the image is centered at Io coordinates 7 degrees south, 306 degrees west. The image

  18. The Challenge of New and Emerging Information Operations

    National Research Council Canada - National Science Library

    Heath, James E; Woodcock, Alexander E

    1999-01-01

    Information operations as defined in Joint Publication 3-13 of the Joint Staff (1998) are aimed at influencing the information and information systems of an adversary and defending one's own information and information systems...

  19. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  20. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  1. Io in Eclipse 2

    Science.gov (United States)

    2007-01-01

    This image of Io eclipsed by Jupiter's shadow is a combination of several images taken by the New Horizons Long Range Reconnaissance Imager (LORRI) between 09:35 and 09:41 Universal Time on February 27, 2007, about 28 hours after the spacecraft's closest approach to Jupiter. North is at the top of the image. In the darkness, only glowing hot lava, auroral displays in Io's tenuous atmosphere and the moon's volcanic plumes are visible. The brightest points of light in the image are the glow of incandescent lava at several active volcanoes. The three brightest volcanoes south of the equator are, from left to right, Pele, Reiden and Marduk. North of the equator, near the disk center, a previously unknown volcano near 22 degrees north, 233 degrees west glows brightly. (The dark streak to its right is an artifact.) The edge of Io's disk is outlined by the auroral glow produced as intense radiation from Jupiter's magnetosphere bombards the atmosphere. The glow is patchy because the atmosphere itself is patchy, being denser over active volcanoes. At the 1 o'clock position the giant glowing plume from the Tvashtar volcano rises 330 kilometers (200 miles) above the edge of the disk, and several smaller plumes are also visible as diffuse glows scattered across the disk. Bright glows at the edge of Io on the left and right sides of the disk mark regions where electrical currents connect Io to Jupiter's magnetosphere. New Horizons was 2.8 million kilometers (1.7 million miles) from Io when this picture was taken, and the image is centered at Io coordinates 2 degrees south, 238 degrees west. The image has been heavily processed to remove scattered light from Jupiter, but some artifacts remain, including a horizontal seam where two sets of frames were pieced together. Total exposure time for this image was 56 seconds.

  2. Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8

    Science.gov (United States)

    2010-03-01

    operational planning. The body of this report describes the data collection (knowledge elicitation) and design plan, encompassing the work domain...generate a new scenario. 360 System: General The system shall allow the user to open existing scenarios. 361 System: General The sytem shall have a...capabilities. IOTA should support students as they learn to organize a body of knowledge, plan and execute a strategy across all influence

  3. Overcoming Information Operations Legal Limitations in Support of Domestic Operations

    Science.gov (United States)

    2008-12-12

    Katrina Update Brief, 24 2200Z SEP 05. US Army Corps of Engineers (USACE). USACE Operations Center ( UOC ) Update Brief, 23 0900 September 2005...USA CGSC, July,2006. US Army Corps of Engineers (USACE). USACE Operations Center ( UOC ) Update Brief, 23 0900 September 2005. USCENTCOM J3

  4. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  5. Review on open source operating systems for internet of things

    Science.gov (United States)

    Wang, Zhengmin; Li, Wei; Dong, Huiliang

    2017-08-01

    Internet of Things (IoT) is an environment in which everywhere and every device became smart in a smart world. Internet of Things is growing vastly; it is an integrated system of uniquely identifiable communicating devices which exchange information in a connected network to provide extensive services. IoT devices have very limited memory, computational power, and power supply. Traditional operating systems (OS) have no way to meet the needs of IoT systems. In this paper, we thus analyze the challenges of IoT OS and survey applicable open source OSs.

  6. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  7. Object‐Oriented RFID with IoT: A Design Concept of  Information Systems in Manufacturing

    Directory of Open Access Journals (Sweden)

    Tamotsu Kamigaki

    2017-02-01

    Full Text Available The Internet of Things (IoT has increasingly become important in industry. Connectivity  over the internet of not only people but also devices (such as sensors, appliances, machines, robots,  and vehicles is leading to a paradigm shift in manufacturing. The Japanese government recognizes  this and has stated that IoT connectivity and the methodologies to exploit it are paramount for  Japanese  industry.  Currently,  the  necessary  changes  have  been  realized  in  large  Japanese  companies;  however,  implementation  in  smaller  companies  has  been  lagging,  despite  the  advantages of introducing IoT technologies, due to the high cost. The objective of this research is to  suggest a design concept which combines IoT and object‐oriented radio frequency identification  (RFID.  IoT technology is  used for  collecting, analyzing, and managing data, and an object‐oriented  RFID  system  is used  as a control  process in manufacturing  systems.  In previous research,  the objectoriented  RFID system  was shown to provide  flexible management through the use of a variety of  OORFID tags. The current research extends this by introducing object‐oriented RFID into IoT  systems to  improve  the  flexibility  in the  manufacturing systems. For the verification of this concept,  an experimental IoT system using object‐oriented  RFID was  designed  and  implemented

  8. Io Surface Changes

    Science.gov (United States)

    2007-01-01

    This montage compares similar sides of Io photographed by the Galileo spacecraft in October 1999 (left) and the New Horizons spacecraft on February 27, 2007. The New Horizons image was taken with its Long Range Reconnaissance Imager (LORRI) from a range of 2.7 million kilometers (1.7 million miles). Most features on Io have changed little in the seven-plus years between these images, despite continued intense volcanic activity. The largest visible feature is the dark oval composed of deposits from the Pele volcano, nearly 1,200 kilometers (750 miles) across its longest dimension. At high northern latitudes, the volcano Dazhbog is prominent as a dark spot in the New Horizons image, near the edge of the disk at the 11 o'clock position. This volcano is much less conspicuous in the Galileo image. This darkening happened after this 1999 Galileo image but before Galileo took its last images of Io in 2001. A more recent change, discovered by New Horizons, can be seen in the southern hemisphere (circled). A new volcanic eruption near 55 degrees south, 290 degrees west has created a roughly circular deposit nearly 500 kilometers (300 miles) in diameter that was not seen by Galileo. Other New Horizons images show that the plume that created this deposit is still active. The New Horizons image is centered at Io coordinates 8 degrees south, 269 degrees west.

  9. IO and OI. I

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1977-01-01

    A fixed-point characterization of the inside-out (IO) and outside-in (OI) context-free tree languages is given. This characterization is used to obtain a theory of nondeterministic systems of context-free equations with parameters. Several “Mezei-and-Wright-like” results are obtained which relate...

  10. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  11. Geologic map of Io

    Science.gov (United States)

    Williams, David A.; Keszthelyi, Laszlo P.; Crown, David A.; Yff, Jessica A.; Jaeger, Windy L.; Schenk, Paul M.; Geissler, Paul E.; Becker, Tammy L.

    2011-01-01

    Io, discovered by Galileo Galilei on January 7–13, 1610, is the innermost of the four Galilean satellites of the planet Jupiter (Galilei, 1610). It is the most volcanically active object in the Solar System, as recognized by observations from six National Aeronautics and Space Administration (NASA) spacecraft: Voyager 1 (March 1979), Voyager 2 (July 1979), Hubble Space Telescope (1990–present), Galileo (1996–2001), Cassini (December 2000), and New Horizons (February 2007). The lack of impact craters on Io in any spacecraft images at any resolution attests to the high resurfacing rate (1 cm/yr) and the dominant role of active volcanism in shaping its surface. High-temperature hot spots detected by the Galileo Solid-State Imager (SSI), Near-Infrared Mapping Spectrometer (NIMS), and Photopolarimeter-Radiometer (PPR) usually correlate with darkest materials on the surface, suggesting active volcanism. The Voyager flybys obtained complete coverage of Io's subjovian hemisphere at 500 m/pixel to 2 km/pixel, and most of the rest of the satellite at 5–20 km/pixel. Repeated Galileo flybys obtained complementary coverage of Io's antijovian hemisphere at 5 m/pixel to 1.4 km/pixel. Thus, the Voyager and Galileo data sets were merged to enable the characterization of the whole surface of the satellite at a consistent resolution. The United States Geological Survey (USGS) produced a set of four global mosaics of Io in visible wavelengths at a spatial resolution of 1 km/pixel, released in February 2006, which we have used as base maps for this new global geologic map. Much has been learned about Io's volcanism, tectonics, degradation, and interior since the Voyager flybys, primarily during and following the Galileo Mission at Jupiter (December 1995–September 2003), and the results have been summarized in books published after the end of the Galileo Mission. Our mapping incorporates this new understanding to assist in map unit definition and to provide a global synthesis

  12. Information Overload and the Operational Commander

    National Research Council Canada - National Science Library

    Fuller, John

    2000-01-01

    .... Decision making paralysis occurs after an individual becomes information saturated. This phenomena is not unique to the military, and many clues for better information management can be found in the business world on Wall Street...

  13. Io - Volcanic Eruption

    Science.gov (United States)

    1979-01-01

    This photo of a volcanic eruption on Jupiter's satellite Io (dark fountain-like feature near the limb) was taken March 4, 1979, about 12 hours before Voyager 1's closest approach to Jupiter. This and the accompanying photo present the evidence for the first active volcanic eruption ever observed on another body in the solar system. This photo taken from a distance of 310,000 miles (499,000 kilometers), shows a plume-like structure rising more than 60 miles (100 kilometers) above the surface, a cloud of material being produced by an active eruption. At least four eruptions have been identified on Voyager 1 pictures and many more may yet be discovered on closer analysis. On a nearly airless body like Io, particulate material thrown out of a volcano follows a ballistic trajectory, accounting for the dome-like shape of the top of the cloud, formed as particles reach the top of their flight path and begin to fall back. Spherical expansion of outflowing gas forms an even larger cloud surrounding the dust. Several regions have been identified by the infrared instrument on Voyager 1 as being several hundred degrees Fahrenheit warmer than surrounding terrain, and correlated with the eruptions. The fact that several eruptions appear to be going on simultaneously makes Io the most active surface in the solar system and suggests to scientists that Io is undergoing continuous volcanism, revising downward the age of Io's surface once again. JPL manages and controls the Voyager Project for NASA's Office of Space Science.

  14. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  15. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  16. 77 FR 7243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2012-02-10

    ... AFFAIRS Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans... ``OMB Control No. 2900-0728.'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10-21091. OMB Control Number: 2900-0728. Type of...

  17. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  18. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  19. Capturing intra-operative safety information using surgical wikis.

    Science.gov (United States)

    Edwards, Michael; Agha, Riaz; Coughlan, Jane

    2013-03-01

    Expert surgeons use a mass of intra-operative information, as well as pre- and post-operative information to complete operations safely. Trainees acquired this intra-operative knowledge at the operating table, now largely diminished by the working time directive. Wikis offer unexplored approaches to capturing and disseminating expert knowledge to further promote safer surgery for the trainee. Grafting an abdominal aortic aneurysm represents a potentially high-risk operation demanding extreme safety measures. Operative details, presented on a surgical wiki in the form of a script and content analysed to classify types of safety information. The intra-operative part of the script contained 2,743 items of essential surgical information, comprising 21 sections, 405 steps and 2,317 items of back-up information; 155 (5.7%) of them were also specific intra-operative safety checks. Best case scenarios consisted of 1,077 items of intra-operative information, 69 of which were safety checks. Worse case and rare scenarios required a further 1,666 items of information, including 86 safety checks. Wikis are relevant to surgical practice specifically as a platform for knowledge sharing and optimising the available operating time of trainees, as a very large amount of minutely detailed information essential for a safe major operation can be captured.

  20. 76 FR 73022 - Agency Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-11-28

    ... AFFAIRS Agency Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously... Enduring Freedom/Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet, VA Form 21... Operation Enduring Freedom or Operation Iraqi Freedom service members who have at least six months remaining...

  1. Geology of Io

    Science.gov (United States)

    Greeley, R.; Craddock, R. A.; Crown, D. A.; Leshin, L. A.; Schaber, G. G.

    1987-01-01

    Geologic mapping of the Jovian satellite Io has been completed at 1:15,000,000 scale for an area lying between +40 and -90 deg latitude and 230 and 45 deg longitude, which includes portions of the Ruwa Patera quadrangle (Ji2) and the Lerna Region (Ji4) and the westernmost section of the Colchis Region (Ji3). Image resolution in the mapped area is commonly 0.5 to 2 km/pxl. High resolution areas (less than .5 km/pxl) are located near the south pole (Lerna Region) and in eastern Ruwa Patera quadrangle. Geologic maps for the Ruwa Patera quadrangle (Ji2) and the Lerna Region (Ji4) have been produced at 1:5,000,000 scale. The present effort reexamines the previously mapped areas and synthesizes the geology of Io on a global scale.

  2. Coalition Information Assurance - Common Operating Picture (CIA-COP)

    National Research Council Canada - National Science Library

    Scheiderich, Louis

    2005-01-01

    .... Cyber Panel sought to provide high-level capabilities to help defend mission-critical information systems by monitoring them for signs of cyber attack and allowing operators to manage the operation...

  3. Changes on Io

    Science.gov (United States)

    2007-01-01

    A: A global map of Jupiter's moon Io derived from eight images taken by the Long Range Reconnaissance Imager (LORRI) on the New Horizons spacecraft, as it passed Jupiter on its way to Pluto in late February 2007. Details as small as 12 kilometers (7 miles) are visible. The map shows the comprehensive picture of Io's volcanism obtained by New Horizons. Yellow ovals denote areas with new, faded or shifted plume deposits since the last images taken by the Galileo spacecraft in 2001. Green circles denote areas where probable new lava flows have occurred. Cyan diamonds indicate locations of active volcanic plumes, and orange hexagons are volcanic hot spots detected by the Linear Etalon Imaging Spectral Array (LEISA) instrument. For plumes and hot spots, symbol size indicates the approximate relative size and brightness of the features. B-F: Comparison of New Horizons (NH) and earlier images of major surface changes discovered by New Horizons at Io's volcanoes Masubi (45 degrees S, 57 degrees West) and North Lerna (55 degrees S, 290 degrees W). The scale bars are 200 kilometers long, and a is the solar phase angle. At Masubi, old lava flows seen by Voyager and Galileo (B) have been obscured at low phase angles (C) by deposits from two active plumes associated with a new 240-kilometer (150-mile) long dark lava flow, which is the longest lava flow known to have been erupted in the solar system since the discovery of Io volcanism in 1979. At North Lerna, a recent eruption has generated a 130-km long lava flow (F), as well as an active plume that has produced a concentric pattern of deposits.

  4. Tactical Information Operations in Contemporary COIN Campaigns

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    Dette Research Paper omhandler hvordan det moderne informationsmiljø påvirker oprørsbekæmpelsesoperationer i dag, og hvordan Informations Operationer (INFO OPS) understøtter oprørsbekæmpelsesoperationer på det taktiske niveau. Research Paperet ser endvidere på hvilke teknikker og kapaciteter der ...

  5. Operational Resilience Improving Criteria in case of Information Security Incidents

    Directory of Open Access Journals (Sweden)

    P. A. Demin

    2012-12-01

    Full Text Available Resilience management system states and behavior are described with the use of fuzzy Petri net. Operational resilience improving criteria in case of information security incidents is defined. Information security incident response management model is introduced.

  6. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  7. Partially reversible quantum operations and their information-theoretical properties

    CERN Document Server

    Ban, M

    2003-01-01

    Partial reversibility of quantum operations (or quantum channels) is considered from the information-theoretical point of view. The necessary and sufficient condition for quantum operations to be partially reversible is shown. The condition can be expressed in terms of information-theoretical quantities (von Neumann entropy and PSI-information). The quantum information-theoretical meanings of the condition are discussed. The results are compared with those obtained for completely reversible quantum operations. The PSI-information is calculated for the quantum depolarizing channel of a qubit and the linear dissipative channel of a single-mode bosonic system.

  8. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  9. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  10. EZ-IO(®) intraosseous device implementation in German Helicopter Emergency Medical Service.

    Science.gov (United States)

    Helm, Matthias; Haunstein, Benedikt; Schlechtriemen, Thomas; Ruppert, Matthias; Lampl, Lorenz; Gäßler, Michael

    2015-03-01

    Intraosseous access (IO) is a rapid and safe alternative when peripheral venous access is difficult. Our aim was to summarize the first three years experience with the use of a semi-automatic IO device (EZ-IO(®)) in German Helicopter Emergency Medical Service (HEMS). Included were all patients during study period (January 2009-December 2011) requiring an IO access performed by HEMS team. Outcome variables were IO rate, IO insertion success rates, site of IO access, type of EZ-IO(®) needle set used, strategy of vascular access, procedure related problems and operator's satisfaction. IO rate was 0.3% (348/120.923). Overall success rate was 99.6% with a first attempt success rate of 85.9%; there was only one failure (0.4%). There were three insertion sites: proximal tibia (87.2%), distal tibia (7.5%) and proximal humerus (5.3%). Within total study group IO was predominantly the second-line strategy (39% vs. 61%, pIO was more often first-line strategy (64% vs. 28%, pIO access were significantly younger (41.7±28.7 vs. 56.5±24.4 years; pIO access generally presented with more severely compromised vital signs associated with the need for more invasive resuscitation actions such as intubation, chest drains, CPR and defibrillation. In 93% EZ-IO(®) needle set handling was rated "good". Problems were reported in 1.6% (needle dislocation 0.8%, needle bending 0.4% and parafusion 0.4%). The IO route was generally used in the most critically ill of patients. Our relatively low rate of usage would indicate that this would be compatible with the recommendations of established guidelines. The EZ-IO(®) intraosseous device proved feasible with a high success rate in adult and pediatric emergency patients in HEMS. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. Digital cartography of Io

    Science.gov (United States)

    Mcewen, Alfred S.; Duck, B.; Edwards, Kathleen

    1991-01-01

    A high resolution controlled mosaic of the hemisphere of Io centered on longitude 310 degrees is produced. Digital cartographic techniques were employed. Approximately 80 Voyager 1 clear and blue filter frames were utilized. This mosaic was merged with low-resolution color images. This dataset is compared to the geologic map of this region. Passage of the Voyager spacecraft through the Io plasma torus during acquisition of the highest resolution images exposed the vidicon detectors to ionized radiation, resulting in dark-current buildup on the vidicon. Because the vidicon is scanned from top to bottom, more charge accumulated toward the bottom of the frames, and the additive error increases from top to bottom as a ramp function. This ramp function was removed by using a model. Photometric normalizations were applied using the Minnaert function. An attempt to use Hapke's photometric function revealed that this function does not adequately describe Io's limb darkening at emission angles greater than 80 degrees. In contrast, the Minnaert function accurately describes the limb darkening up to emission angles of about 89 degrees. The improved set of discrete camera angles derived from this effort will be used in conjunction with the space telemetry pointing history file (the IPPS file), corrected on 4 or 12 second intervals to derive a revised time history for the pointing of the Infrared Interferometric Spectrometer (IRIS). For IRIS observations acquired between camera shutterings, the IPPS file can be corrected by linear interpolation, provided that the spacecraft motions were continuous. Image areas corresponding to the fields of view of IRIS spectra acquired between camera shutterings will be extracted from the mosaic to place the IRIS observations and hotspot models into geologic context.

  12. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  13. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  14. Io's tenuous atmosphere

    International Nuclear Information System (INIS)

    Johnson, T.V.; Matson, D.L.

    1989-01-01

    An evaluation is made of observational evidence adduced to date for the various extant models of the Io atmosphere. SO2 and its various photochemical products have been noted to play a major role in the atmosphere; such atomic species as Na and K are present in smaller quantities, and play an important role in the atmosphere's ion chemistry. The vapor pressure equilibrium between condensed SO 2 on the surface and the atmospheric gas is an important factor in the global control of SO 2 gas distribution, but cannot account for the neutral densities at the terminator required for ionospheric models in view of realistic surface temperature distributions

  15. Event Sequence Analysis of the Air Intelligence Agency Information Operations Center Flight Operations

    National Research Council Canada - National Science Library

    Larsen, Glen

    1998-01-01

    This report applies Event Sequence Analysis, methodology adapted from aircraft mishap investigation, to an investigation of the performance of the Air Intelligence Agency's Information Operations Center (IOC...

  16. The concept of information support system for operational personnel of operating NPPs

    International Nuclear Information System (INIS)

    Dunaev, V.G.; Golovanov, V.V.

    1993-01-01

    The paper has been prepared on the materials of the concept developed by the order of ''Rosenergoatom'' concern. In the present paper the main definitions, the principal objectives and functions of the operator support system (OSS) are stated, a brief analysis of operation features of some existing operator information systems is presented, the main trends of development of operator information support system are given, the way and the sequence for implementation of the systems for operating NPPs are reviewed. In this proposed concept in the first place are considered the information support systems for the operators of the power unit main control rooms, however, the presented principles may be applied while designing information support systems for operators of other control rooms of NPP. 4 refs

  17. Eruption on Io

    Science.gov (United States)

    1996-01-01

    This image, taken by NASA's Galileo spacecraft, shows a new blue-colored volcanic plume extending about 100 kilometers (about 60 miles) into space from Jupiter's moon Io (see inset at lower left). The blue color of the plume is consistent with the presence of sulfur dioxide gas and 'snow' condensing from the gas as the plume expands and cools. Galileo images have also shown that the Ra Patera plume glows in the dark, perhaps due to the fluorescence of sulfur and oxygen ions created by the breaking apart of sulfur dioxide molecules by energetic particles in the Jovian magnetosphere. The images at right show a comparison of changes seen near the volcano Ra Patera since the Voyager spacecraft flybys of 1979 (windows at right show Voyager image at top and Galileo image at bottom). This eruptive plume is an example of a new type of volcanic activity discovered during Voyager's flyby in 1979, believed to be geyser-like eruptions driven by sulfur dioxide or sulfur gas erupting and freezing in Io's extremely tenuous atmosphere. Volcanic eruptions on Earth cannot throw materials to such high altitudes. Ra Patera is the site of dramatic surface changes. An area around the volcano of about 40,000 square kilometers, area about the size of New Jersey, has been covered by new volcanic deposits. The image was taken in late June 28, 1996 from a distance of 972,000 kilometers (604,000 miles). The Galileo mission is managed by NASA's Jet Propulsion Laboratory.

  18. U.S. Military Information Operations in Afghanistan: Effectiveness of Psychological Operations 2001-2010

    Science.gov (United States)

    2012-01-01

    capabilities to the actual implementer of those capabilities. There was general agree- ment that the IO officer should help translate a commander’s...According to their argument, the PSYOP planning cycle should translate “commanders’ objectives into themes,” and a separate IO offi- cer is not needed...chological objective1 • PSYACT: activities conducted for their psychological impact2 • PSYOP product: any visual, audio, or audiovisual item

  19. Hybrid I/O automata

    NARCIS (Netherlands)

    N.A. Lynch; R. Segala; F.W. Vaandrager (Frits); H.B. Weinberg

    1995-01-01

    textabstractWe propose a new hybrid I/O automaton model that is capable of describing both continuous and discrete behavior. The model, which extends the timed I/O automaton model of Lynch et al and the phase transition system models of Manna et al, allows communication among components using both

  20. Pele Plume Deposit on Io

    Science.gov (United States)

    1997-01-01

    The varied effects of Ionian volcanism can be seen in this false color infrared composite image of Io's trailing hemisphere. Low resolution color data from Galileo's first orbit (June, 1996) have been combined with a higher resolution clear filter picture taken on the third orbit (November, 1996) of the spacecraft around Jupiter.A diffuse ring of bright red material encircles Pele, the site of an ongoing, high velocity volcanic eruption. Pele's plume is nearly invisible, except in back-lit photographs, but its deposits indicate energetic ejection of sulfurous materials out to distances more than 600 kilometers from the central vent. Another bright red deposit lies adjacent to Marduk, also a currently active ediface. High temperature hot spots have been detected at both these locations, due to the eruption of molten material in lava flows or lava lakes. Bright red deposits on Io darken and disappear within years or decades of deposition, so the presence of bright red materials marks the sites of recent volcanism.This composite was created from data obtained by the Solid State Imaging (CCD) system aboard NASA's Galileo spacecraft. The region imaged is centered on 15 degrees South, 224 degrees West, and is almost 2400 kilometers across. The finest details that can be discerned in this picture are about 3 kilometers across. North is towards the top of the picture and the sun illuminates the surface from the west.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  1. ROOT I/O improvements

    Energy Technology Data Exchange (ETDEWEB)

    Canal, Ph. [Fermilab

    2012-01-01

    In the past year, the development of ROOT I/O has focused on improving the existing code and increasing the collaboration with the experiments experts. Regular I/O workshops have been held to share and build upon the various experiences and points of view. The resulting improvements in ROOT I/O span many dimensions including reduction and more control over the memory usage, reduction in CPU usage as well as optimization of the file size and the hardware I/O utilization. Many of these enhancements came as a result of an increased collaboration with the experiments development teams and their direct contributions both in code and quarterly ROOT I/O workshops.

  2. Redefining Information Warfare Boundaries for an Army in a Wireless World

    Science.gov (United States)

    2013-01-01

    information and cognitive effects. Currently, FA30s are trained inte- grators; they are not required to have a particular level of mastery in any of the...forward for cyber operations, EW, and IO. In the memo, he concluded the following: 1. The cyber-EW-IO vocabulary in use today is adequate—but will

  3. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  4. Weighted E-Spaces and Epistemic Information Operators

    Directory of Open Access Journals (Sweden)

    Mark Burgin

    2014-06-01

    Full Text Available Information is usually related to knowledge. Here, we present a broader picture in which information is associated with epistemic structures, which form cognitive infological systems as basic recipients and creators of cognitive information. Infological systems are modeled by epistemic spaces, while operators in these spaces are mathematical models of information. Information that acts on epistemic structures is called cognitive information, while information that acts on knowledge structures is called epistemic information. The latter brings new and updates existing knowledge, being of primary importance to people. In this paper, both types of information are studied as operators in epistemic spaces based on the general theory of information. As a synthetic approach, which reveals the essence of information, organizing and encompassing all main directions in information theory, the general theory of information provides efficient means for such a study. Different types of information dynamics representation use tools from various mathematical disciplines, such as the theory of categories, functional analysis, mathematical logic and algebra. In this paper, we base our exploration of information and knowledge dynamics on functional analysis further developing the mathematical stratum of the general theory of information.

  5. Io Eclipse Montage

    Science.gov (United States)

    2007-01-01

    New Horizons took this montage of images of Jupiter's volcanic moon Io, glowing in the dark of Jupiter's shadow, as the Pluto-bound spacecraft sped through the Jupiter system on Feb. 27, 2007. (A): In this picture from the Long-Range Reconnaissance Imager (LORRI), dark blotches and straight lines are artifacts. The brightest spots (including the volcanoes Pele [P] and East Girru [EG]) are incandescent lava from active volcanoes. The more diffuse glows, and the many faint spots, are from gas in the plumes and atmosphere, glowing due to bombardment by plasma in Jupiter's magnetosphere, in a display similar to the Earth's aurorae. (B): The same image with a latitude/longitude grid, showing that the cluster of faint spots is centered near longitude 0 degrees, the point on Io that faces Jupiter. The image also shows the locations of the plumes seen in sunlit images (indicated by red diamonds), which glow with auroral emission in eclipse. (C): Simulated sunlit view of Io with the same geometry, based on sunlit LORRI images. (D): A combination of the sunlit image (in cyan) and the eclipse image (in red), showing that all point-like glows in the eclipse image arise from dark volcanoes in the eclipse image. (E): This infrared image, at a wavelength of 2.3 microns, obtained by New Horizons Linear Etalon Spectral Imaging Array (LEISA) an hour after the LORRI image, showing thermal emission from active volcanoes. Elongation of the hot spots is an artifact. (F): Combined visible albedo (cyan) and LEISA thermal emission (red) image, showing the sources of the volcanic emission. That most of the faint point-like glows near longitude zero, seen in visible light in images A, B, and D, do not appear in the infrared view of volcanic heat radiation, is one reason scientists believe that these glows are due to auroral emission, not heat radiation. This image appears in the Oct. 12, 2007, issue of Science magazine, in a paper by John Spencer, et al.

  6. Sharing electronic structure and crystallographic data with ETSF_IO

    Science.gov (United States)

    Caliste, D.; Pouillon, Y.; Verstraete, M. J.; Olevano, V.; Gonze, X.

    2008-11-01

    We present a library of routines whose main goal is to read and write exchangeable files (NetCDF file format) storing electronic structure and crystallographic information. It is based on the specification agreed inside the European Theoretical Spectroscopy Facility (ETSF). Accordingly, this library is nicknamed ETSF_IO. The purpose of this article is to give both an overview of the ETSF_IO library and a closer look at its usage. ETSF_IO is designed to be robust and easy to use, close to Fortran read and write routines. To facilitate its adoption, a complete documentation of the input and output arguments of the routines is available in the package, as well as six tutorials explaining in detail various possible uses of the library routines. Catalogue identifier: AEBG_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEBG_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Gnu Lesser General Public License No. of lines in distributed program, including test data, etc.: 63 156 No. of bytes in distributed program, including test data, etc.: 363 390 Distribution format: tar.gz Programming language: Fortran 95 Computer: All systems with a Fortran95 compiler Operating system: All systems with a Fortran95 compiler Classification: 7.3, 8 External routines: NetCDF, http://www.unidata.ucar.edu/software/netcdf Nature of problem: Store and exchange electronic structure data and crystallographic data independently of the computational platform, language and generating software Solution method: Implement a library based both on NetCDF file format and an open specification (http://etsf.eu/index.php?page=standardization)

  7. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  8. EDONIO: Extended distributed object network I/O library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H. [Oak Ridge National Lab., TN (United States). Mathematical Sciences Section

    1995-03-01

    This report describes EDONIO (Extended Distributed Object Network I/O), an enhanced version of DONIO (Distributed Object Network I/O Library) optimized for the Intel Paragon Systems using the new M-ASYNC access mode. DONIO provided fast file I/O capabilities in the Intel iPSC/860 and Paragon distributed memory parallel environments by caching a copy of the entire file in memory distributed across all processors. EDONIO is more memory efficient by caching only a subset of the disk file at a time. DONIO was restricted by the high memory requirements and use of 32-bit integer indexing to handle files no larger than 2 Gigabytes. EDONIO overcomes this barrier by using the extended integer library routines provided by Intel`s NX operating system. For certain applications, EDONIO may show a ten-fold improvement in performance over the native NX I/O routines.

  9. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  10. Alice Views Jupiter and Io

    Science.gov (United States)

    2007-01-01

    This graphic illustrates the pointing and shows the data from one of many observations made by the New Horizons Alice ultraviolet spectrometer (UVS) instrument during the Pluto-bound spacecraft's recent encounter with Jupiter. The red lines in the graphic show the scale, orientation, and position of the combined 'box and slot' field of view of the Alice UVS during this observation. The positions of Jupiter's volcanic moon, Io, the torus of ionized gas from Io, and Jupiter are shown relative to the Alice field of view. Like a prism, the spectrometer separates light from these targets into its constituent wavelengths. Io's volcanoes produce an extremely tenuous atmosphere made up primarily of sulfur dioxide gas, which, in the harsh plasma environment at Io, breaks down into its component sulfur and oxygen atoms. Alice observed the auroral glow from these atoms in Io's atmosphere and their ionized counterparts in the Io torus. Io's dayside is deliberately overexposed to bring out faint details in the plumes and on the moon's night side. The continuing eruption of the volcano Tvashtar, at the 1 o'clock position, produces an enormous plume roughly 330 kilometers (200 miles) high, which is illuminated both by sunlight and 'Jupiter light.'

  11. Operator Informational Needs for Multiple Autonomous Small Vehicles

    Science.gov (United States)

    Trujillo, Anna C.; Fan, Henry; Cross, Charles D.; Hempley, Lucas E.; Cichella, Venanzio; Puig-Navarro, Javier; Mehdi, Syed Bilal

    2015-01-01

    With the anticipated explosion of small unmanned aerial vehicles, it is highly likely that operators will be controlling fleets of autonomous vehicles. To fulfill the promise of autonomy, vehicle operators will not be concerned with manual control of the vehicle; instead, they will deal with the overall mission. Furthermore, the one operator to many vehicles is becoming a constant meme with various industries including package delivery, search and rescue, and utility companies. In order for an operator to concurrently control several vehicles, his station must look and behave very differently than the current ground control station instantiations. Furthermore, the vehicle will have to be much more autonomous, especially during non-normal operations, in order to accommodate the knowledge deficit or the information overload of the operator in charge of several vehicles. The expected usage increase of small drones requires presenting the operational information generated by a fleet of heterogeneous autonomous agents to an operator. NASA Langley Research Center's Autonomy Incubator has brought together researchers in various disciplines including controls, trajectory planning, systems engineering, and human factors to develop an integrated system to study autonomy issues. The initial human factors effort is focusing on mission displays that would give an operator the overall status of all autonomous agents involved in the current mission. This paper will discuss the specifics of the mission displays for operators controlling several vehicles.

  12. Terrorist Use of the Internet: Information Operations in Cyberspace

    Science.gov (United States)

    2011-03-08

    terrorist financing enterprise. Internet Ponzi schemes , identity theft, counterfeiting, and other types of computer fraud have been shown to yield high...CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Use of the Internet: Information Operations in...reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching

  13. The impact of information technology on the operations of Nigerian ...

    African Journals Online (AJOL)

    This paper examines the impact of information technology on the operations of Nigerian banks five banks were randomly selected for the study, while three hundred and fifty (350) questionnaires were distributed to respondents, but only two hundred and sixty (260) were retrieved.The study revealed that information ...

  14. Information Operations: The Need for a National Strategy

    Science.gov (United States)

    2002-06-01

    now, it just hasn’t been classified as such. They offer Radio and TV Martí broadcasts from America to Cuba and the pro- Cuban press as an example of...music and cinema . (“Taliban”, 2001) Because of their disdain for technology and modern technology, an effective IO campaign will be difficult

  15. Operator interface design considerations for a PACS information management system

    Science.gov (United States)

    Steinke, James E.; Nabijee, Kamal H.; Freeman, Rick H.; Prior, Fred W.

    1990-08-01

    As prototype PACS grow into fully digital departmental and hospital-wide systems, effective information storage and retrieval mechanisms become increasingly important. Thus far, designers of PACS workstations have concentrated on image communication and display functionality. The new challenge is to provide appropriate operator interface environments to facilitate information retrieval. The "Marburg Model" 1 provides a detailed analysis of the functions, control flows and data structures used in Radiology. It identifies a set of "actors" who perform information manipulation functions. Drawing on this model and its associated methodology it is possible to identify four modes of use of information systems in Radiology: Clinical Routine, Research, Consultation, and Administration. Each mode has its own specific access requirements and views of information. An operator interface strategy appropriate for each mode will be proposed. Clinical Routine mode is the principal concern of PACS primary diagnosis workstations. In a full PACS implementation, such workstations must provide a simple and consistent navigational aid for the on-line image database, a local work list of cases to be reviewed, and easy access to information from other hospital information systems. A hierarchical method of information access is preferred because it provides the ability to start at high-level entities and iteratively narrow the scope of information from which to select subsequent operations. An implementation using hierarchical, nested software windows which fulfills such requirements shall be examined.

  16. Micromanaging the IoT space

    Science.gov (United States)

    Mayer, Irak Vicarte

    2017-05-01

    The speed of IoT devices currently connected in our daily lives has drastically accelerated in the last couple of years. The lack of standardization, regulation, and an efficient process to integrate these devices to our ecosystem has led to a relaxed security and an ineffective use of the data generated. This paper presents a new approach to the IoT ecosystem management that improves data sharing and security by categorizing and micromanaging the connected devices. The use of micromanaging multiple access points (M2AP) allows the architecture to respond faster and efficiently to events and attacks to the digital hive. The "local beehive"/ "master beehive" approach seals a compromise of delegating tasks and improving the network management capacity. Finally, an efficient data storage and compact reports of the raw information collected can then be transmitted to cloud services for further analysis if required.

  17. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  18. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  19. Volcanic eruptions on Io

    Science.gov (United States)

    Strom, R. G.; Schneider, N. M.; Terrile, R. J.; Cook, A. F.; Hansen, C.

    1981-09-01

    Nine eruption plumes which were observed during the Voyager 1 encounter with Io are discussed. During the Voyager 2 encounter, four months later, eight of the eruptions were still active although the largest became inactive sometime between the two encounters. Plumes range in height from 60 to over 300 km with corresponding ejection velocities of 0.5 to 1.0 km/s and plume sources are located on several plains and consist of fissures or calderas. The shape and brightness distribution together with the pattern of the surface deposition on a plume 3 is simulated by a ballistic model with a constant ejection velocity of 0.5 km/s and ejection angles which vary from 0-55 deg. The distribution of active and recent eruptions is concentrated in the equatorial regions and indicates that volcanic activity is more frequent and intense in the equatorial regions than in the polar regions. Due to the geologic setting of certain plume sources and large reservoirs of volatiles required for the active eruptions, it is concluded that sulfur volcanism rather than silicate volcanism is the most likely driving mechanism for the eruption plumes.

  20. SCORPIO: A Scalable Two-Phase Parallel I/O Library With Application To A Large Scale Subsurface Simulator

    Energy Technology Data Exchange (ETDEWEB)

    Sreepathi, Sarat [ORNL; Sripathi, Vamsi [Intel Corporation; Mills, Richard T [ORNL; Hammond, Glenn [Pacific Northwest National Laboratory (PNNL); Mahinthakumar, Kumar [North Carolina State University

    2013-01-01

    Inefficient parallel I/O is known to be a major bottleneck among scientific applications employed on supercomputers as the number of processor cores grows into the thousands. Our prior experience indicated that parallel I/O libraries such as HDF5 that rely on MPI-IO do not scale well beyond 10K processor cores, especially on parallel file systems (like Lustre) with single point of resource contention. Our previous optimization efforts for a massively parallel multi-phase and multi-component subsurface simulator (PFLOTRAN) led to a two-phase I/O approach at the application level where a set of designated processes participate in the I/O process by splitting the I/O operation into a communication phase and a disk I/O phase. The designated I/O processes are created by splitting the MPI global communicator into multiple sub-communicators. The root process in each sub-communicator is responsible for performing the I/O operations for the entire group and then distributing the data to rest of the group. This approach resulted in over 25X speedup in HDF I/O read performance and 3X speedup in write performance for PFLOTRAN at over 100K processor cores on the ORNL Jaguar supercomputer. This research describes the design and development of a general purpose parallel I/O library, SCORPIO (SCalable block-ORiented Parallel I/O) that incorporates our optimized two-phase I/O approach. The library provides a simplified higher level abstraction to the user, sitting atop existing parallel I/O libraries (such as HDF5) and implements optimized I/O access patterns that can scale on larger number of processors. Performance results with standard benchmark problems and PFLOTRAN indicate that our library is able to maintain the same speedups as before with the added flexibility of being applicable to a wider range of I/O intensive applications.

  1. Cyberethics and co-operation in the information society.

    Science.gov (United States)

    Fuchs, Christian; Bichler, Robert M; Raffl, Celina

    2009-12-01

    The task of this paper is to ground the notion of cyberethics of co-operation. The evolution of modern society has resulted in a shift from industrial society towards informational capitalism. This transformation is a multidimensional shift that affects all aspects of society. Hence also the ethical system of society is penetrated by the emergence of the knowledge society and ethical guidelines for the information age are needed. Ethical issues and conflicts in the knowledge society are connected to topics of ecological and social sustainability. For information ethics and cyberethics, the sustainable design of society, social, and socio-technological systems is important. In this context the notions of sustainability and co-operation are discussed. Based on these categories, the approach of cyberethics of co-operation can be theoretically grounded.

  2. Polar Heat Flow on Io

    Science.gov (United States)

    Veeder, G. J.; Matson, D. L.; Johnson, T. V.; Davies, A. G.; Blaney, D. L.

    2003-01-01

    Recently, Galileo spacecraft data have revealed Io's polar regions to be much warmer than previously expected. This unexpected development came from Photo-Polarimeter Radiometer (PPR) data which show that the minimum night temperatures are in the range of 90-95 K virtually everywhere on Io. The minimum night temperatures show no dependence upon latitude and, when away from the sunset terminator, they show no dependence upon time of night. This is indeed bizarre behavior for surface units which generally had been assumed to be passive with respect to Io's pervasive volcanism. Night temperatures of 90-95 K at high, polar latitudes are particularly hard to explain. Even assuming infinite thermal inertia, at these latitudes there is insufficient sunlight to support these warm night temperatures. Thus, through the process of elimination of other possibilities, we come to the conclusion that these surfaces are volcanically heated. Taking previously passive units and turning them into new sources of heat flow is a radical departure from previous thermophysical model paradigms. However, the geological interpretation is straight forward. We are simply seeing the effect of old, cool lava flows which cover most of the surface of Io but yet have some heat to radiate. Under these new constraints, we have taken on the challenge of formulating a physical model which quantitatively reproduces all of the observations of Io's thermal emission. In the following we introduce a new parametric model which suffices to identify a previously unrecognized polar component of Io's heat flow.

  3. Combined Joint Task Force-Horn of Africa: Winning the War on Terror with Information Engagement

    National Research Council Canada - National Science Library

    Garcia, Michelle M

    2007-01-01

    ...) to win the Global War on Terrorism (GWOT) in the Horn of Africa. Because of the mission, the resources available to the task force, and the nature of the conflict, the command chose a COA that uses Information Operations (IO...

  4. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  5. Defining the Information within Military Information Operations: Utilizing a Case Study of the Jammu and Kashmir Conflict

    National Research Council Canada - National Science Library

    Bookard, Joe D

    2006-01-01

    The current operating environment requires the United States military to conduct military information operations throughout the conflict spectrum, during all phases, and across various military operations...

  6. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  7. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  8. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  9. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  10. A Reference Model for Monitoring IoT WSN-Based Applications

    OpenAIRE

    Capella, Juan Vicente; Campelo, Jos? Carlos; Bonastre, Alberto; Ors, Rafael

    2016-01-01

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility ...

  11. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  12. Information Technology In Supply Chain Operations: A Road Map ...

    African Journals Online (AJOL)

    A five phase model and seven-step practical plan are proposed after careful evaluation of critical success factors, the role of IT in SCM and the overall benefits which can result in successful application of IT to SC operations. The paper concludes by stressing that connecting numerous information systems and integrating ...

  13. Analysis of Informal Credit Operations among Farmers In Atisbo ...

    African Journals Online (AJOL)

    The study explored the operations, (savings and loan procurement), as well as the problems and prospects of the informal financial institutions in ATISBO Local Government Area of Oyo State, Southwest Nigeria. The sampling technique used was Stratified Random Sampling to select three villages from the area and ...

  14. 75 FR 31744 - Information Collection; Contract Operations and Administration

    Science.gov (United States)

    2010-06-04

    ... information collected under Forest Service contracts is required by laws, regulations, and/or timber sale... the terms of a contract could result in delays, disputes, claims, litigation, and/or defaults. The... plans, requests, agreements and notices necessary for operations under the terms of the contracts...

  15. Identification of the operating crew's information needs for accident management

    International Nuclear Information System (INIS)

    Nelson, W.R.; Hanson, D.J.; Ward, L.W.; Solberg, D.E.

    1988-01-01

    While it would be very difficult to predetermine all of the actions required to mitigate the consequences of every potential severe accident for a nuclear power plant, development of additional guidance and training could improve the likelihood that the operating crew would implement effective sever-accident management measures. The US Nuclear Regulatory Commission (NRC) is conducting an Accident Management Research Program that emphasizes the application of severe-accident research results to enhance the capability of the plant operating crew to effectively manage severe accidents. One element of this program includes identification of the information needed by the operating crew in severe-accident situations. This paper discusses a method developed for identifying these information needs and its application. The methodology has been applied to a generic reactor design representing a PWR with a large dry containment. The information needs were identified by systematically determining what information is needed to assess the health of the critical functions, identify the presence of challenges, select strategies, and assess the effectiveness of these strategies. This method allows the systematic identification of information needs for a broad range of severe-accident scenarios and can be validated by exercising the functional models for any specific event sequence

  16. Formal specification and implementation of operations in information management systems

    International Nuclear Information System (INIS)

    Sandewall, E.

    1983-02-01

    Among information management systems we include general purpose systems, such as text editors and data editors (forms management systems), as well as special purpose systems such as mail systems and computer based calendars. Based on a method for formal specification of some aspects of IMS, namely the structure of the data base, the update operations, and the user dialogue, the paper shows how reasonable procedures for executing IMS operations can be written in the notation of a first-order theory, in such a way that the procedure is a logical consequence of the specification. (Author)

  17. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  18. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  19. Io and Europa Meet Again

    Science.gov (United States)

    2007-01-01

    This beautiful image of the crescents of volcanic Io and more sedate Europa is a combination of two New Horizons images taken March 2, 2007, about two days after New Horizons made its closest approach to Jupiter. A lower-resolution color image snapped by the Multispectral Visual Imaging Camera (MVIC) at 10:34 universal time (UT) has been merged with a higher-resolution black-and-white image taken by the Long Range Reconnaissance Imager (LORRI) at 10:23 UT. The composite image shows the relative positions of Io and Europa, which were moving past each other during the image sequence, as they were at the time the LORRI image was taken. This image was taken from a range of 4.6 million kilometers (2.8 million miles) from Io and 3.8 million kilometers (2.4 million miles) from Europa. Although the moons appear close together in this view, a gulf of 790,000 kilometers (490,000 miles) separates them. Io's night side is lit up by light reflected from Jupiter, which is off the frame to the right. Europa's night side is dark, in contrast to Io, because this side of Europa faces away from Jupiter. Here Io steals the show with its beautiful display of volcanic activity. Three volcanic plumes are visible. Most conspicuous is the enormous 300-kilometer (190-mile) high plume from the Tvashtar volcano at the 11 o'clock position on Io's disk. Two much smaller plumes are also visible: that from the volcano Prometheus, at the 9 o'clock position on the edge of Io's disk, and from the volcano Amirani, seen between Prometheus and Tvashtar along Io's terminator (the line dividing day and night). The Tvashtar plume appears blue because of the scattering of light by tiny dust particles ejected by the volcanoes, similar to the blue appearance of smoke. In addition, the contrasting red glow of hot lava can be seen at the source of the Tvashtar plume. The images are centered at 1 degree North, 60 degrees West on Io, and 0 degrees North, 149 degrees West on Europa. The color in this image was

  20. Educating Officers in Information Operations: Is the U.S. Army Moving in the Right Direction?

    National Research Council Canada - National Science Library

    Gregory, Thomas

    2003-01-01

    ...) to address Information Operations. This study examines the doctrine that exists to support Information Operations as well as how Information Operations is being incorporated into the Army's Officer Education System...

  1. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  2. Subsidence of topography on Io

    Science.gov (United States)

    Webb, Erik K.; Stevenson, David J.

    1987-01-01

    The underlying roots of Io's topographic features are softened and eroded by contact with the hot mantle, resulting in a subsidence which is analogous to the progress of a butter pat on a frying pan. This process would be offset by crustal thickening due to continuing volcanism if the rate for this phenomenon were more than the observed 1 cm/year or less. Because the crustal thinning would occur at about 50 cm/year if the material underneath were a pure magma ocean, Io cannot have a global magna ocean, and interior viscosities greater than about 10 to the 10th P are implied.

  3. Education of information users and promotional operations of the branch information centre

    International Nuclear Information System (INIS)

    Kohoutova, J.

    1982-01-01

    The Nuclear Information Centre also operates in the field of education and publicity. It organizes seminars, symposia and exhibitions in Czechoslovakia and abroad and has processed handbooks for INIS output users. Working excursions are also organized to the Nuclear Information Centre. (M.D.)

  4. 75 FR 47631 - Swets Information Services, Operations Department, Information Technology Group, Marketing Group...

    Science.gov (United States)

    2010-08-06

    ... Services, Operations Department, Information Technology Group, Marketing Group, Finance Group, Runnemede..., Information Technology (IT) Group, Marketing Group and the Finance Group into one entity instead of... Technology Group, Marketing Group, and Finance Group, Runnemede, New Jersey, who became totally or partially...

  5. Activity-Based Information Integrating the operations strategy

    Directory of Open Access Journals (Sweden)

    José Augusto da Rocha de Araujo

    2005-12-01

    Full Text Available In the globalized world, companies seek for new operations strategies to ensure world corporate success. This article analyzes how the cost management models – both traditional and activity-based, aid the planning and management of corporate globalized operations. The efficacy of the models application depends on their alignment with the competitive strategy. Companies must evaluate the nature of the competition and its competitive priorities; they should then define the necessary and sufficient dependence level on costs information. In this article, three dependence levels are presented: operational, decision support and strategic control. The result of the research shows the importance of alignment between the cost management model and the competitive strategy for corporate success, and confirms the adequacy of the activity-based costing model as a supporting tool for decision taking in a global strategy. Case studies in world class companies in Brazil are presented.

  6. Kinetics and mechanism of the IO + IO reaction

    Science.gov (United States)

    Sander, S. P.

    1986-01-01

    The flash photolysis-absorption technique has been used to measure the rate constant for the reaction IO + IO over the temperature range 250-373 K and pressure range 20-700 torr of N2. The rate constant for the overall reaction was found to be independent of pressure and equal to 1.73 x 10 to the -12th exp (1020 + or - 200)/T cu cm/molecule s. Branching ratios for the reaction channels forming 2I + O2, I2 + O2, and I2O2, were found to be pressure dependent, with the I2 channel accounting for less than 5 percent of the total reaction over the observed pressure range. A stable reaction product was observed between 230 and 300 nm which was formed on a long time scale compared to IO disappearance. The rate constant for the reaction I + O3 + yields to IO + O2 was measured at 298 K and found to be (9.5 + or - 1.5) x 10 to the -13th cu cm/molecule s.

  7. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  8. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  9. A Reference Model for Monitoring IoT WSN-Based Applications

    Directory of Open Access Journals (Sweden)

    Juan Vicente Capella

    2016-10-01

    Full Text Available The Internet of Things (IoT is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP, which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN’s behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  10. Mobile Geospatial Information Systems for Land Force Operations: Analysis of Operational Needs and Research Opportunities

    Science.gov (United States)

    2010-03-01

    Task Analysis ( HTA ), Cognitive Work Analysis (CWA) Military battlefield awareness, wayfind*, terrain navigation, route guidance, reconnaissance...where specific attention was paid to how the device met the military operational tasks and physical and technical considerations. The information...location as well as separating different geographical features on mobile GIS systems. In military settings, much attention , training and

  11. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  12. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    mental conidi tions and aircraft parameters have been used to adjust difficulty. ,.p \\pl ~ -t is hiavet-n ~~~imiited to procedures arid position training...Cakir, A., Hart, I). J., & Stewart., 1. B. M. (1980). Visual display terminals: a manual covering ergonomics, workplace design, health and safety, task...Staff * review event. implementation problems * review overall performance o discuss simulator discrepancies VII. MANAGE DATA FUNCION I. A i rerew Data

  13. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  14. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  15. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  16. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  17. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-01-01

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds. PMID:27367695

  18. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  19. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  20. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  1. Strategic and operational information watch newsletter nr 3

    International Nuclear Information System (INIS)

    2017-04-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses news about the Paris agreement (negotiation in Bonn, statement of the Canadian minister of Defence, commitment by the Lebanese army to reduce its emissions), about the energy sector (the lowest level of oil discovery, partial privatisation of Saudi Aramco, and economic and energetic diversification of Saudi Arabia), and climate change as a source of tensions and collaborations. The second part reports an operational information watch which addresses new technologies and renewable energies (photovoltaic cells operating in the dark, waste energetic valorisation in field operations, the issue of energy security for US military allowances, use of drones for logistics, a Gripen fighter aircraft flies with bio-fuel) and proposes a health watch (consequences of UV exposure in field operations, impact of El Nino on cholera distribution in Africa, the ban of ragweed in France). The newsletter finally indicates some brief news, events and recent publications

  2. A Return to Io: Science Goals and Implementation

    Science.gov (United States)

    Spencer, J. R.; Smythe, W. D.; Lopes-Gautier, R.; McEwen, A. S.

    2001-01-01

    Io remains one of the most fascinating objects in the solar system: the only place beyond Earth where we can watch hard-rock geology in action. In its high heat flow Io resembles the early Earth, providing a present-day analog to some of the processes that dominated the Earth's geology at the time that life first appeared. Io's usefulness as an early-Earth analog has been underscored recently by the detection of very high eruption temperatures, hotter than terrestrial basaltic lavas. These temperatures are most plausibly interpreted as resulting from ultramafic lava compositions, analagous to the komatiites that were common on Earth in the Precambrian but which have been virtually absent during the Phanerozoic. The large scale of many Io eruptions also provides useful analogs to Phanerozoic terrestrial eruptions, such as flood basalts, which are important for the Earth's geological and biological evolution but which occur too rarely to be witnessed by humans on our own planet. By providing living examples, Io can thus play the same role in understanding large-scale planetary volcanism that volcanically active terrestrial regions have played in understanding the results of smaller-scale volcanic processes seen in the geological record worldwide. Additional information is contained in the original extended abstract.

  3. Implementing and operating the Hanford Environmental Information System (HEIS)

    International Nuclear Information System (INIS)

    Cowley, P.J.; Schwab, M.R.; Fox, R.D.

    1994-03-01

    In the process of performing environmental restoration at the 560-square mile Hanford Site in southeastern Washington State, vast amounts of scientific and technical data are being generated from sampling taking place all over the Site. This paper provides an overview of the lessons we have learned in designing, implementing, and putting into operation a computerized system named the Hanford Environmental Information System (HEIS), which is being used to manage the Site's environmental characterization sampling data. Topics discussed in this paper include helping the Site adapt to a data management culture, the advantages of electronic data over paper data, issues of data validation and defensibility, being a resource to the user community (including the regulatory community), managing and tracking data changes, integrating data from multiple programs, providing configuration control for data and software, getting priorities for software development, and developing a baseline for on-going funding to maintain the infrastructure for the information system

  4. Bi2(IO3)(IO6): First combination of [IO3]- and [IO6]5- anions in three-dimensional framework

    Science.gov (United States)

    Sun, Chuanling; Wu, Yuandong; Mei, Dajiang; Doert, Thomas

    2018-03-01

    A new bismuth (III) iodate periodate, Bi2(IO3)(IO6) was obtained from hydrothermal reactions using Bi(NO3)3·5H2O, and H5IO6 as starting materials. Bi2(IO3)(IO6) crystallizes in the monoclinic space group P21/c (No. 14) with lattice parameters ɑ = 8.1119(6), b = 5.4746(4), c = 16.357(1) Å, β = 99.187(2)°, V = 717.07(9) Å3, Z = 4. The structure of Bi2(IO3)(IO6) features a three-dimensional framework which is a combination of [Bi(1)O5] tetragonal pyramids, [Bi(2)O8] bicapped trigonal prisms and [IO3]- and [IO6]5- anions. Thermal analysis shows that the compound is thermally stable up to about 350 °C. The solid state UV-vis-NIR diffuse reflectance spectrum indicates that Bi2(IO3)(IO6) is a semiconductor with a band gap of 2.76 eV.

  5. Toward realistic and practical ideal observer (IO) estimation for the optimization of medical imaging systems.

    Science.gov (United States)

    He, Xin; Caffo, Brian S; Frey, Eric C

    2008-10-01

    The ideal observer (IO) employs complete knowledge of the available data statistics and sets an upper limit on observer performance on a binary classification task. However, the IO test statistic cannot be calculated analytically, except for cases where object statistics are extremely simple. Kupinski have developed a Markov chain Monte Carlo (MCMC) based technique to compute the IO test statistic for, in principle, arbitrarily complex objects and imaging systems. In this work, we applied MCMC to estimate the IO test statistic in the context of myocardial perfusion SPECT (MPS). We modeled the imaging system using an analytic SPECT projector with attenuation, distant-dependent detector-response modeling and Poisson noise statistics. The object is a family of parameterized torso phantoms with variable geometric and organ uptake parameters. To accelerate the imaging simulation process and thus enable the MCMC IO estimation, we used discretized anatomic parameters and continuous uptake parameters in defining the objects. The imaging process simulation was modeled by precomputing projections for each organ for a finite number of discretely-parameterized anatomic parameters and taking linear combinations of the organ projections based on continuous sampling of the organ uptake parameters. The proposed method greatly reduces the computational burden and allows MCMC IO estimation for a realistic MPS imaging simulation. We validated the proposed IO estimation technique by estimating IO test statistics for a large number of input objects. The properties of the first- and second-order statistics of the IO test statistics estimated using the MCMC IO estimation technique agreed well with theoretical predictions. Further, as expected, the IO had better performance, as measured by the receiver operating characteristic (ROC) curve, than the Hotelling observer. This method is developed for SPECT imaging. However, it can be adapted to any linear imaging system.

  6. Ergonomic design in the operating room: information technologies

    Science.gov (United States)

    Morita, Mark M.; Ratib, Osman

    2005-04-01

    The ergonomic design in the Surgical OR of information technology systems has been and continues to be a large problem. Numerous disparate information systems with unique hardware and display configurations create an environment similar to the chaotic environments of air traffic control. Patient information systems tend to show all available statistics making it difficult to isolate the key, relevant vitals for the patient. Interactions in this sterile environment are still being done with the traditional keyboard and mouse designed for cubicle office workflows. This presentation will address the shortcomings of the current design paradigm in the Surgical OR that relate to Information Technology systems. It will offer a perspective that addresses the ergonomic deficiencies and predicts how future technological innovations will integrate into this vision. Part of this vision includes a Surgical OR PACS prototype, developed by GE Healthcare Technologies, that addresses ergonomic challenges of PACS in the OR that include lack of portability, sterile field integrity, and UI targeted for diagnostic radiologists. GWindows (gesture control) developed by Microsoft Research and Voice command will allow for the surgeons to navigate and review diagnostic imagery without using the conventional keyboard and mouse that disrupt the integrity of the sterile field. This prototype also demonstrates how a wireless, battery powered, self contained mobile PACS workstation can be optimally positioned for a surgeon to reference images during an intervention as opposed to the current pre-operative review. Lessons learned from the creation of the Surgical OR PACS Prototype have demonstrated that PACS alone is not the end all solution in the OR. Integration of other disparate information systems and presentation of this information in simple, easy to navigate information packets will enable smoother interactions for the surgeons and other healthcare professionals in the OR. More intuitive

  7. Evolution of Io's volatile inventory

    International Nuclear Information System (INIS)

    Pollack, J.B.; Witteborn, F.C.

    1980-01-01

    Voyager data are used to make crude estimates of the rate at which Io loses volatiles, by a variety of processes, to the surrounding magnetosphere, for the case of both the current, SO2-dominated atmosphere and hypothetical paleoatmospheres in which such other gases as N2 may have been the dominant constituent. Among the mechanisms making significant contributions to the prodigious rate at which Io is losing volatiles are: the interaction of the magnetospheric plasma with volcanic plume particles and the background atmosphere, the sputtering of ices on the surface, if the nightside atmospheric pressure is low enough and Jeans' escape of O as a dissociation product of SO2 gas. It is also argued that in the case of paleoatmospheres only the first two alternatives would have been possible and, nevertheless, insufficient to account for N2 loss over the life of the satellite

  8. Defense Waste Processing Facility staged operations: environmental information document

    International Nuclear Information System (INIS)

    1981-11-01

    Environmental information is presented relating to a staged version of the proposed Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The information is intended to provide the basis for an Environmental Impact Statement. In either the integral or the staged design, the DWPF will convert the high-level waste currently stored in tanks into: a leach-resistant form containing about 99.9% of all the radioactivity, and a residual, slightly contaminated salt, which is disposed of as saltcrete. In the first stage of the staged version, the insoluble sludge portion of the waste and the long lived radionuclides contained therein will be vitrified. The waste glass will be sealed in canisters and stored onsite until shipped to a Federal repository. In the second stage, the supernate portion of the waste will be decontaminated by ion exchange. The recovered radionuclides will be transferred to the Stage 1 facility, and mixed with the sludge feed before vitrification. The residual, slightly contaminated salt solution will be mixed with Portland cement to form a concrete product (saltcrete) which will be buried onsite in an engineered landfill. This document describes the conceptual facilities and processes for producing glass waste and decontaminated salt. The environmental effects of facility construction, normal operations, and accidents are then presented. Descriptions of site and environs, alternative sites and waste disposal options, and environmental consultations and permits are given in the base Environmental Information Document

  9. Photokeratoconjunctivitis Symptoms among Informal Welding Operators in North Samarinda, Indonesia

    Directory of Open Access Journals (Sweden)

    Iwan Muhamad Ramdan

    2017-08-01

    Sektor informal telah berkontribusi terhadap perekonomian nasional, namun praktik kesehatan dan keselamatan kerja pada sektor ini masih belum memuaskan. Salah satu usaha sektor informal yang banyak dijumpai di Samarinda Utara adalah usaha pengelasan dengan potensi bahaya utama paparan sinar ultraviolet yang dapat menyebabkan photokeratoconjunctivitis. Penelitian ini bertujuan menginvestigasi kejadian photokeratoconjunctivitis dan faktor yang memengaruhinya pada operator las informal di Kelurahan Samarinda Utara. Penelitian cross-sectional telah dilakukan terhadap 40 responden pada bulan Maret sampai November 2016. Pengumpulan data menggunakan UV detector meter, clamp meter, dan kuesioner. Analisis data menggunakan chi-square, Pearson’s correlation product moment, dan multiple linear regression. Lima puluh persen responden mengalami gejala photokeratoconjunctivitis. Alat pelindung diri (APD (p=0,004, durasi paparan UV (0,056, pengetahuan tentang kesehatan, dan keselamatan kerja (K3 (p=0,055 dan jumlah hari kerja (p=0,001 berhubungan signifikan dengan kejadian photokeratoconjunctivitis. Lokasi kerja (p=0,244, tingkat pendidikan (p=0,680, usia (0,167, intensitas radiasi UV (p=0,206, dan kuat arus las (p=0,085 tidak berhubungan dengan gejala photokeratoconjunctivitis. Simpulan, gejala photokeratoconjunctivitis dipengaruhi oleh penggunaan APD, durasi paparan UV, pengetahuan K3, dan jumlah hari kerja. Faktor yang paling dominan memengaruhi gejala photokeratoconjunctivitis adalah durasi paparan UV.

  10. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  11. Hanford Environmental Information System (HEIS) Operator`s Manual. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Schreck, R.I.

    1991-10-01

    The Hanford Environmental Information System (HEIS) is a consolidated set of automated resources that effectively manage the data gathered during environmental monitoring and restoration of the Hanford Site. The HEIS includes an integrated database that provides consistent and current data to all users and promotes sharing of data by the entire user community. This manual describes the facilities available to the operational user who is responsible for data entry, processing, scheduling, reporting, and quality assurance. A companion manual, the HEIS User`s Manual, describes the facilities available-to the scientist, engineer, or manager who uses the system for environmental monitoring, assessment, and restoration planning; and to the regulator who is responsible for reviewing Hanford Site operations against regulatory requirements and guidelines.

  12. An Information Management System for CHIKYU Operation and its Future

    Science.gov (United States)

    Kuramoto, S.; Matsuda, S.; Ito, H.

    2005-12-01

    The CDEX (Center for Deep Earth Exploration, JAMSTEC) is an implementing organization of a riser drilling vessel, CHIKYU ("Earth"). CHIKYU has a large capability to produce a wide variety of data, core measurement data, logging data, mud logging data, cuttings data and monitoring data in boreholes, etc. Also CDEX conducts site survey for safety drilling and publication before and after cruises. It is critical that these diverse data be managed using a unified, coherent method, and that they be organized and provided to users in an intuitive, clearly understandable way that reflects the aims and underlying philosophies of the IODP and JAMSTEC. It is crucial that these data are accessible to users through an integrated interface in which all data formats, management tools, and procedures are standardized. Meeting these goals will assure total usability for scientists, administrators, and the public, from data creation to uploading and cataloging, to end use and publication. CDEX is developing an integrated information management system, call "SIO7" (Scientific Information from 7 Oceans) for CHIKYU operation, and would like to extend to adopt various information handling systems in geosciences. The SIO7 composed of 2 major systems, J-CORES (JAMSTEC Core Systematics) and DEXIS (Deep Earth Exploration Information System) (see http://sio7.jamstec.go.jp/ for the details). J-CORES is a database system designated to manage all aspects of core data. The system is modeled on the JANUS system developed by and for ODP, but implements an extended, somewhat modified data model. The functions that support onboard and real time data input operations have also been strengthened. A variety of data visualization and visual core description functions have been added, and data loading from those applications has been automated, making the system as a whole both powerful and easy to use. On the other hand, DEXIS is developed based on the combination and integration of existing off

  13. Target Bosnia: Integrating Information Activities in Peace Operations. NATO-Led Operations in Bosnia-Herzegovina, December 1995-1997

    National Research Council Canada - National Science Library

    Siegel, Pascale C

    1998-01-01

    This monograph examines the role of information in Peace Support Operations (PSO) and its impact on command and control through the prism of NATO-led operations in Bosnia-Herzegovina from December 1995 into 1997...

  14. 78 FR 77484 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator...

    Science.gov (United States)

    2013-12-23

    ... partners and relevant industry stakeholders. Additionally, to facilitate the exchange of security information in a timely fashion, contact data is necessary for pipeline operators' security operations or...

  15. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  16. Research and design of smart grid monitoring control via terminal based on iOS system

    Science.gov (United States)

    Fu, Wei; Gong, Li; Chen, Heli; Pan, Guangji

    2017-06-01

    Aiming at a series of problems existing in current smart grid monitoring Control Terminal, such as high costs, poor portability, simple monitoring system, poor software extensions, low system reliability when transmitting information, single man-machine interface, poor security, etc., smart grid remote monitoring system based on the iOS system has been designed. The system interacts with smart grid server so that it can acquire grid data through WiFi/3G/4G networks, and monitor each grid line running status, as well as power plant equipment operating conditions. When it occurs an exception in the power plant, incident information can be sent to the user iOS terminal equipment timely, which will provide troubleshooting information to help the grid staff to make the right decisions in a timely manner, to avoid further accidents. Field tests have shown the system realizes the integrated grid monitoring functions, low maintenance cost, friendly interface, high security and reliability, and it possesses certain applicable value.

  17. Trilinos I/O Support (Trios

    Directory of Open Access Journals (Sweden)

    Ron A. Oldfield

    2012-01-01

    Full Text Available Trilinos I/O Support (Trios is a new capability area in Trilinos that serves two important roles: (1 it provides and supports I/O libraries used by in-production scientific codes; (2 it provides a research vehicle for the evaluation and distribution of new techniques to improve I/O on advanced platforms. This paper provides a brief overview of the production-grade I/O libraries in Trios as well as some of the ongoing research efforts that contribute to the experimental libraries in Trios.

  18. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define u......FLIP, a benchmark for measuring the response time of flash IO patterns. We also present a benchmarking methodology which takes into account the particular characteristics of flash devices. Finally, we present the results obtained by measuring eleven flash devices, and derive a set of design hints that should drive...

  19. Wind Information Uplink to Aircraft Performing Interval Management Operations

    Science.gov (United States)

    Ahmad, Nashat N.; Barmore, Bryan E.; Swieringa, Kurt A.

    2016-01-01

    Interval Management (IM) is an ADS-B-enabled suite of applications that use ground and flight deck capabilities and procedures designed to support the relative spacing of aircraft (Barmore et al., 2004, Murdoch et al. 2009, Barmore 2009, Swieringa et al. 2011; Weitz et al. 2012). Relative spacing refers to managing the position of one aircraft to a time or distance relative to another aircraft, as opposed to a static reference point such as a point over the ground or clock time. This results in improved inter-aircraft spacing precision and is expected to allow aircraft to be spaced closer to the applicable separation standard than current operations. Consequently, if the reduced spacing is used in scheduling, IM can reduce the time interval between the first and last aircraft in an overall arrival flow, resulting in increased throughput. Because IM relies on speed changes to achieve precise spacing, it can reduce costly, low-altitude, vectoring, which increases both efficiency and throughput in capacity-constrained airspace without negatively impacting controller workload and task complexity. This is expected to increase overall system efficiency. The Flight Deck Interval Management (FIM) equipment provides speeds to the flight crew that will deliver them to the achieve-by point at the controller-specified time, i.e., assigned spacing goal, after the target aircraft crosses the achieve-by point (Figure 1.1). Since the IM and target aircraft may not be on the same arrival procedure, the FIM equipment predicts the estimated times of arrival (ETA) for both the IM and target aircraft to the achieve-by point. This involves generating an approximate four-dimensional trajectory for each aircraft. The accuracy of the wind data used to generate those trajectories is critical to the success of the IM operation. There are two main forms of uncertainty in the wind information used by the FIM equipment. The first is the accuracy of the forecast modeling done by the weather

  20. Information Operations - Analysis Support and Capability Requirements (Operations d'information - Soutien a l'analyse et exigences de capacites) (CD-ROM)

    National Research Council Canada - National Science Library

    2006-01-01

    ...: The focus of the study "Information Operations - Analysis Support and Capability Requirements" undertaken by the RTO Task Group SAS-057 was to provide recommendations to improve analysis support...

  1. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  2. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  3. Towards Stream-based Reasoning and Machine Learning for IoT Applications

    OpenAIRE

    Endler , Markus; Briot , Jean-Pierre; Almeida , Vitor P.; Silva e Silva , Francisco; Haeusler , Edward ,

    2017-01-01

    International audience; As distributed IoT applications become larger and more complex, the pure processing of raw sensor and actuation data streams becomes impractical.Instead, data streams must be fused into tangible facts and these pieces of information must be combined with a background knowledge to infer new pieces of knowledge. And since many IoT applications require almost real-time reactivity to stimulus of the environment, such information inference process has to be performed in a c...

  4. Strategic and operational information watch newsletter nr 2

    International Nuclear Information System (INIS)

    2017-02-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses news about the responsibility of climate changes in the emergence or aggravation of some present crisis, about what is going on in the USA in relationship with climate and defence issues (decisions by Trump, statement of the Secretary of Defence, influence of the political context), about the energy sector (instability of the oil market, the international role of India in the international climate and energy policy), and about international negotiations on climate. The second part reports an operational information watch addresses new technologies and renewable energies, and issues related to the vulnerability, protection and adaptation of infrastructures and equipment, and a health watch (soldier training in hot and wet environment, drought as a factor of Nile fever epidemic, climate changes and always higher risks for human health in Europe). The newsletter finally indicates some brief news, events and recent publications

  5. Strategic and operational information watch newsletter nr 1

    International Nuclear Information System (INIS)

    2016-12-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses the following topics: the environment taken into account by the International Criminal Court, impacts of climate change on tensions about rural estate in Africa, resolution of the European Parliament on the European Union of Defence, environmental and energy strategy of the Danish Ministry of Defence, COP22 in Marrakech, and so on. The second part reports an operational information watch addresses the threat on the US DoD environmental agenda by the new Trump administration, the adaptation of US forces to climate changes, the threat of climate change on US DoD infrastructures, a US base self-sufficient in energy, NATO actions for energy efficiency, thermal regulation improvement for soldiers, impact of El Nino on the propagation of the Zika virus, launching of the Lancet countdown. The newsletter finally indicates some brief news, events and recent publications

  6. 78 FR 73818 - Information Collection; Timber Sale Contract Operations and Administration

    Science.gov (United States)

    2013-12-09

    ... by laws, regulations, and/or timber sale policies. Each contract specifies information the contractor... plans, requests, agreements, and notices necessary for operations under the terms of the contracts... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Timber Sale Contract Operations...

  7. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  8. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  9. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  10. Unit information system operational displays for VVER-1000 reactors

    International Nuclear Information System (INIS)

    Anikanov, S.S.; Carrera, J.P.; Gordon, P.

    1997-01-01

    The role of high level operational displays is explained as well as the principles of the design of such displays. The tasks of WWER operating personnel are described and the support provided by operational displays is highlighted. The architecture of the displays is also dealt with. (A.K.)

  11. On Approach: Jupiter and Io

    Science.gov (United States)

    2007-01-01

    [figure removed for brevity, see original site] Click on the image for movie of On Approach: Jupiter and Io This sequence of images was taken on Jan. 8, 2007, with the New Horizons Long Range Reconnaissance Imager (LORRI), while the spacecraft was about 81 million kilometers (about 50 million miles) from Jupiter. Jupiter's volcanic moon Io is to the right; the planet's Great Red Spot is also visible. The image was one of 11 taken during the Jan. 8 approach sequence, which signaled the opening of the New Horizons Jupiter encounter. Even in these early approach images, Jupiter shows different face than what previous visiting spacecraft -- such as Voyager 1, Galileo and Cassini -- have seen. Regions around the equator and in the southern tropical latitudes seem remarkably calm, even in the typically turbulent 'wake' behind the Great Red Spot. The New Horizons science team will scrutinize these major meteorological features -- including the unexpectedly calm regions -- to understand the diverse variety of dynamical processes on the solar system's largest planet. These include the newly formed Little Red Spot, the Great Red Spot and a variety of zonal features.

  12. Cryptography, Information Operations and the Industrial Base: A Policy Dilemma

    National Research Council Canada - National Science Library

    Horner, Stephen

    1997-01-01

    .... The explosive force of information technology places the Global Information Infrastructure, the worldwide industrial base and the various world governments in both mutually supporting and somewhat adversarial positions...

  13. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  14. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  15. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  16. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  17. Feedback to the field: an assessment of sternal intraosseous (IO) infusion.

    Science.gov (United States)

    Harcke, H Theodore; Crawley, Geoffrey; Mazuchowski, Edward

    2011-01-01

    Intraosseous vascular infusion (IO) is a recognized alternative to peripheral intravenous infusion when access is inadequate. The sternum and proximal tibia are the preferred sites. A review of 98 cases at autopsy revealed successful sternal IO placement in 78 cases (80%). Assuming a worst case scenario for placement (pin mark and no tip in bone [17 cases] and tip present and not in the sternum [3 cases]), attempts were unsuccessful in 20 cases (20%). We draw no specific conclusions regarding sternal IO use, but hope that personnel placing these devices and those providing medical training can use the information. 2011.

  18. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  19. Ground-Based Observattions of IO

    Science.gov (United States)

    Matson, D. L.

    1986-06-01

    Io is the most geologically active of all the planets or satellites in the solar system. Most of what is known about it has been discovered in the past decade. This paper reviews recent advances in the knowledge of Io's surface, with emphasis placed on facts obtained using astronomical instruments on the ground and in Earth-orbit.

  20. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    . This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  1. Lack of visible change around active hotspots on Io

    Science.gov (United States)

    1996-01-01

    Detail of changes around two hotspots on Jupiter's moon Io as seen by Voyager 1 in April 1979 (left) and NASA's Galileo spacecraft on September 7th, 1996 (middle and right). The right frame was created with images from the Galileo Solid State Imaging system's near-infrared (756 nm), green, and violet filters. For better comparison, the middle frame mimics Voyager colors. The calderas at the top and at the lower right of the images correspond to the locations of hotspots detected by the Near Infrared Mapping Spectrometer aboard the Galileo spacecraft during its second orbit. There are no significant morphologic changes around these hot calderas; however, the diffuse red deposits, which are simply dark in the Voyager colors, appear to be associated with recent and/or ongoing volcanic activity. The three calderas range in size from approximately 100 kilometers to approximately 150 kilometers in diameter. The caldera in the lower right of each frame is named Malik. North is to the top of all frames.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  2. Information networks and library co-operation in Indonesia

    OpenAIRE

    Sulistyo-Basuki, L.

    2002-01-01

    Documentation and information networks in Indonesia began in 1971 with the establishment of four information networks in the fields of science and technology, agriculture and biology, health and medicine and humanities and social sciences. It was followed by about 30 information networks, a few which are still functioning as actual information networks while the weakest point is in humanities and social sciences. Union catalogues as a means of information networks have been compiled by variou...

  3. Sources of Na for the Io atmosphere

    Science.gov (United States)

    Burnett, D. S.; Ellis, Susan B.; Rice, A.; Epstein, S.

    1993-01-01

    The physics and geology of Io have been extensively studied, but there has been little discussion of the chemistry. Relatively little is known about Io chemistry, but there are constraints. Further, it will be a long time before improvements will result from direct observation, given the severe difficulties with the Galileo mission. Via laboratory simulation experiments, plausible thermochemical and photochemical processes which determine the nature and amounts of surface constituents of Io are explored. The well-known density of Io shows that the planet overall is rocky. Because the orbit of Io is well within the magnetosphere of Jupiter and because Io only has a thin, transient SO2 atmosphere, the surface is continually sputtered with magnetospheric ions. Complex processes ionize and accelerate the Io surface atoms to keV and MeV energies. Remarkably, only S, O, and Na ions were found by Voyager. Sputtering also produces an atomic cloud of Na and S (O not observable) with a trace of K. Both gaseous and solid SO2 are known from spectroscopic studies. A trace of H2S and possibly CO2 are present. Geologic features are interpreted in terms of elemental S, but there is no direct evidence for this constituent. We thus have a rocky planet which does not have rocks on the surface. Our general goal is to understand the cycling of Na, S, and O through the crust and atmosphere on present-day Io and to understand how Io evolved to this state. A specific objective was to determine the phases on the surface which are the source of the Na in the atmosphere of Io.

  4. Requirements to be made on future information systems in NPP operation

    International Nuclear Information System (INIS)

    Becker, G.; Distler, K.

    1987-01-01

    The objective of advanced operational information systems (OIS) is to support and alleviate the operator's work. Human skills and performance limits on the one hand, and the tasks of the operators during various operating states on the other hand are the bases for deriving system design requirements. The paper discusses such aspects like the dynamism of process events, the passive/active role played by the operators in normal/disturbed operation, the compatibility of information representation between OIS and conventional display configuration, parallel versus serial information presentation, team work of operators, parallel processing of tasks within the team; the resulting requirements are derived. (orig./DG) [de

  5. International Organizations (IOs), Epistemic Tools of Influence, and the Colonial Geopolitics of Knowledge Production in Higher Education Policy

    Science.gov (United States)

    Shahjahan, Riyad A.

    2016-01-01

    While other scholars have analyzed the way that international organizations (IOs) in higher education policy may contribute to neocolonial domination, this paper illuminates not only on "how" IOs' epistemic activities promulgate one-size fit all solutions, but centers the colonial structures of knowledge/power that inform the…

  6. Application of IoT in monitoring and controlling agricultural production

    Directory of Open Access Journals (Sweden)

    Marković Dušan

    2015-01-01

    Full Text Available Internet of Things (IoT is a concept that allows physical objects with computational and sensory support to connect with each other and access services across the Internet. The IoT idea was introduced to connect devices through the Internet and facilitate access to information for users. The wide range of potential applications of IoT also includes agriculture, where extensive use of IoT is expected in the future. The aim of this work was to present the IoT concept as a basis for monitoring and control systems used in farm production processes. IoT devices play a key role, with a focus on their realization by available microcontroller platforms and appropriate sensors such as Arduino products. Autonomous sensor devices gather data within monitoring systems and participate in the control process by sending signals to the actuators. Such an IoT based system provides users with the opportunity to remotely monitor conditions and production process. This system enables users to accomplish savings in inputs, achieve cost reduction and trace the production process on the farm.

  7. H-infty Control of systems with multiple i/o delays

    NARCIS (Netherlands)

    Agoes Ariffin Moelja, A.A.; Meinsma, Gjerrit; Mirkin, Leonid

    2003-01-01

    In this paper the standard (four-block) H-infty control problem for systems with multiple i/o delays in the feedback loop is studied. The central idea is to see the multiple delay operator as a special series connection of elementary delay operators, called the adobe delay operators. The adobe delay

  8. Towards Stream-based Reasoning and Machine Learning for IoT Applications

    OpenAIRE

    Endler, Markus; Briot, Jean-Pierre; Almeida, Vitor P.; Silva e Silva, Francisco; Haeusler, Edward,

    2017-01-01

    To appear in Proceedings of the IEEE Intelligent Systems Conference (IntelliSys'2017), London, U.K, September 2017.; As distributed IoT applications become larger and more complex, the pure processing of raw sensor and actuation data streams becomes impractical. Instead, data streams must be fused into tangible facts and these pieces of information must be combined with a background knowledge to infer new pieces of knowledge. And since many IoT applications require almost real-time reactivity...

  9. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  10. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  11. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  12. 14 CFR 135.83 - Operating information required.

    Science.gov (United States)

    2010-01-01

    ... retractable landing gear, an emergency cockpit checklist containing the procedures required by paragraph (c...-the-top operations, that data must be sufficient to enable the pilot to determine compliance with...

  13. 47 CFR 76.1610 - Change of operational information.

    Science.gov (United States)

    2010-10-01

    ..., partnership, corporation, or government entity. See § 76.5(cc). If the operator is a partnership, the legal... code, and e-mail address, if applicable, to which all communications are to be directed; (d) The nature...

  14. Weather information integration in transportation management center (TMC) operations.

    Science.gov (United States)

    2011-01-02

    This report presents the results of the third phase of an on-going FHWA study on weather integration in Transportation Management Center (TMC) operations. The report briefly describes the earlier phases of the integration study, summarizes the findin...

  15. Hot-spot tectonics on Io

    Science.gov (United States)

    Mcewen, A. S.

    1985-01-01

    The thesis is that extensional tectonics and low-angle detachment faults probably occur on Io in association with the hot spots. These processes may occur on a much shorter timescale on Ion than on Earth, so that Io could be a natural laboratory for the study of thermotectonics. Furthermore, studies of heat and detachment in crustal extension on Earth and the other terresrial planets (especially Venus and Mars) may provide analogs to processes on Io. The geology of Io is dominated by volcanism and hot spots, most likely the result of tidal heating. Hot spots cover 1 to 2% of Io's surface, radiating at temperatures typically from 200 to 400 K, and occasionally up to 700K. Heat loss from the largest hot spots on Io, such as Loki Patera, is about 300 times the heat loss from Yellowstone, so a tremendous quantity of energy is available for volcanic and tectonic work. Active volcanism on Io results in a resurfacing rate as high as 10 cm per year, yet many structural features are apparent on the surface. Therefore, the tectonics must be highly active.

  16. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  17. Army Secure Operating System: Information Security for Real Time Systems

    National Research Council Canada - National Science Library

    Anderson, Eric

    1984-01-01

    .... ASOS will support real time applications software coded in Ada. In addition, ASOS will incorporate information security technology to protect classified data processed by Army tactical systems...

  18. Utilisation of operating experiences - NUCIA (Nuclear Information Archives)

    International Nuclear Information System (INIS)

    Tsuruta, T.

    2007-01-01

    In this presentation, 'NUCIA (Nuclear Information Archives)', an information-disclosure library for nuclear facilities, is introduced as one of the action cases to ensure transparency of nuclear facilities. At the opening of the presentation, the mechanisms of information disclosure to he used in the event of trouble are overviewed, and the role of NUCIA will be explained in the process. Next, registered information and the data on administrative performance are introduced after explaining the purpose and principal content of NUCIA referring to the on-screen display of the actual conditions of NUCIA. (author)

  19. IoT-Based User-Driven Service Modeling Environment for a Smart Space Management System

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-01-01

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service. PMID:25420153

  20. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  1. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  2. Information Technology: Opportunities for Improving Acquisitions and Operations

    Science.gov (United States)

    2017-04-01

    acquisitions using agile development processes.26 One participant noted that, in her experience, the government may not explore all procurement...United States Government Accountability Office Highlights of GAO-17-251SP, a GAO forum April 2017 INFORMATION TECHNOLOGY Opportunities... government leadership. They identified key actions related to the following topics: strengthening the Federal Information Technology Acquisition Reform Act

  3. INFORMATIONAL APPLICATION FOR THE SUPPORT OF OPERATIONAL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Rotaru Simona

    2008-05-01

    Full Text Available The development of the informational and communicational technology makes possible the use of a diversity of systems, instruments and technologies that offer to the decisional factors sharp and safe informations and also proper ways to process and analyse those informations in order to achieve an efficient development of their activities. We chose the internet - for theoretic and also for practical reasons - as informational technology because it stays at the base of other informational, decisional and communicational technologies - the intranet, the extranet, the web, the e-commerce, the groupware etc. Among the practical reasons we mention: low costs, fast communications and the performances inside the office and in relation with other people, especially with the clients; the market's development and the easier acquisition and fusion processes.

  4. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  5. Rojas novada tūrisma iOS lietotnes izveide

    OpenAIRE

    Baurovskis, Armands

    2013-01-01

    Kvalifikācijas darbā – „Rojas novada tūrisma iOS lietotnes izveide” ir izstrādāta Rojas novada tūrisma lietotne iOS operētājsistēmai – „Roja Travel Guide”. Izstrāde tika veikta ar spējo programmatūras izstrādes metodi. Lietotne nodrošina informāciju divās valodās – latviešu un angļu – par Rojas novada tūrisma objektiem, kā arī ļauj lasīt jaunākās ziņas, kas ir saistītas ar novadu. Lietotne ir paredzēta tūristiem un vietējiem iedzīvotājiem. Lietotne strādā pilnvērtīgi uz visiem iPhone un iPad ...

  6. Observations of industrial sulfur flows - Implications for Io

    International Nuclear Information System (INIS)

    Greeley, R.; Lee, S.W.; Crown, D.A.; Lancaster, N.

    1990-01-01

    A study of industrial liquid sulfur flows at about 130 C yields information on the thermal and rheological characteristics of the sulfur encountered in Io's volcanic activity. As the local sulfur flow cools and/or the local flow rate decreases, the formation of a crust over much of the surface does not prevent a continuation of flow underneath. Subsequent rapid development of a durable crust implies the formation of extensive crusts on Ionian sulfur flows, significantly reducing heat loss and extending flow length. It is suggested on the basis of the present laboratory results that the colors of proposed sulfur flows on Io may correlate with neither the temperature nor the inferred rheological properties attributed to the colors. 52 refs

  7. Information Theory for Risk-based Water System Operation

    NARCIS (Netherlands)

    Weijs, S.V.

    2011-01-01

    Operational management of water resources needs predictions of future behavior of water systems, to anticipate shortage or excess of water in a timely manner. Because the natural systems that are part of the hydrological cycle are complex, the predictions inevitably are subject to considerable

  8. Advanced Operational Concepts for Information Sharing and Coordination Centers

    Science.gov (United States)

    2007-07-01

    will become active regardless of their location. For example, one member, after receiving the alert, finds the Metro has stopped operating due to...but have an RJ-45 Ethernet connector (instead of the standard RJ-11) and can connect directly to a router. They have all hardware and software

  9. Cooperation between information system development and operations: a literature review

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan Amrit; Daneva, Maia; Torchiano, M.

    2014-01-01

    Software development can profit from improvements in the deployment and maintenance phases. DevOps improves these phases through a collection of principles and practices, centered around close collaboration between Development and Operations personnel. Both sides have paid little attention to issues

  10. The operation criteria of a health management information system ...

    African Journals Online (AJOL)

    In order to achieve maximum returns on an investment or intervention evaluation should be from the outset. The process must consider system life cycle management and the organization's policy and budget as important integral factors. Objective: To evaluate the operation phase of the implemented Health Management ...

  11. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  12. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  13. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  14. Weather Information Services supporting Civilian UAS Operations, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We build a system that supports the weather information needs of Unmanned Aircraft Systems (UAS) planning to fly in the National Airspace System (NAS). This weather...

  15. 77 FR 40493 - Operations Specifications; OMB Approval of Information Collection

    Science.gov (United States)

    2012-07-10

    ... 5. 2012. FOR FURTHER INFORMATION CONTACT: For technical questions contact Darcy D. Reed..., 800 Independence Avenue SW., Washington DC 20591; email: Darcy[email protected] ; Telephone: 202-385...

  16. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  17. Effect of plasma density around Io on local electron heating in the Io plasma torus

    Science.gov (United States)

    Tsuchiya, F.; Yoshioka, K.; Kagitani, M.; Kimura, T.; Murakami, G.; Yamazaki, A.; Misawa, H.; Kasaba, Y.; Yoshikawa, I.; Sakanoi, T.; Koga, R.; Ryo, A.; Suzuki, F.; Hikida, R.

    2017-12-01

    HISAKI observation of Io plasma torus (IPT) with extreme ultraviolet (EUV) wavelength range is a useful probe to access plasma environment in inner magnetosphere of Jupiter. Emissions from sulfur and oxygen ions in EUV range are caused by electron impact excitation and their intensity is well correlated with the abundance of hot electron in IPT. Previous observation showed that the brightness was enhanced downstream of the satellite Io, indicating that efficient electron heating takes place at Io and/or just downstream of Io. Detailed analysis of the emission intensity shows that the brightness depends on the magnetic longitude at Io and primary and secondary peaks appear in the longitude ranges of 100-130 and 250-340 degrees, respectively. The peak position and amplitude are slightly different between dawn and dusk sides. Here, we introduce inhomogeneous IPT density model in order to investigate relation between the emission intensity and local plasma density around Io in detail. An empirical IPT model is used for spatial distribution of ion and electron densities in the meridional plane. To include longitude and local time asymmetry in IPT, we consider (1)dawnward shift of IPT due to global convection electric field, (2) offset of Jupiter's dipole magnetic field, and (3) tilt of IPT with respect to Io's orbital plane. The modeled electron density at the position of Io as a function of magnetic longitude at Io shows similar profile with the ion emission intensity derived from the observation. This result suggests that energy extracted around Io and/or efficiency of electron heating is closely related to the plasma density around Io and longitude and local time dependences is explained by the spatial inhomogeneity of plasma density in IPT. A part of the energy extracted around Io could be transferred to the Jovian ionosphere along the magnetic field line and cause bright aurora spots and strong radio emissions.

  18. Preparing the American Soldier in a Brigade Combat Team to Conduct Information Operations in the Contemporary Operational Environment

    Science.gov (United States)

    2006-06-01

    doctrine is enemy-focused. FM 3-0 states that “IO are used to deny, destroy, degrade , disrupt, deceive, exploit, and influence the enemy’s ability to...haji’ or ‘ diaper head’ you are mildly eroding the respects of the culture. These are things to look at in training, but it is critical to be

  19. Understanding Commanders’ Information Needs for Influence Operations

    Science.gov (United States)

    2009-01-01

    Dynamics, May 1999; and Dunia Lopez-Pintado, “Diffusion in Complex Social Networks,” WP-AD 2004-33, Instituto Valenciano de Investigaciones Economicas...1917. Lopez-Pintado, Dunia, “Diffusion in Complex Social Networks,” Working Paper WP-AD 2004-33, Instituto Valenciano de Investigaciones Economicas...107 E. Assessment of Social Network Analysis for Influence Operations

  20. Techniques for Information Collection During Operations Among Populations

    Science.gov (United States)

    2016-04-05

    or a scheduled meeting. This interaction can also occur via telephone calls, video teleconference, or other audiovisual mediums. This engagement...operation. PRE-DEPLOYMENT PLANNING 2-2. Planning is the process by which Army leaders translate the commander’s visualization into a specific...effective way to communicate or translate this to their Soldiers. DEPLOYMENT PREPARATION 2-29. Units prepare for deployment. When applied to

  1. Leveraging information technology to enable network centric engineer reconnaissance operations

    OpenAIRE

    Barton, Keith W.

    2003-01-01

    The Naval Construction Force has traditionally depended on outside sources to obtain and analyze engineering data in contingency situations. The Navy has embarked on an initiative to develop Seabee Engineer Reconnaissance Teams to perform this function, both as a basis for projects slated for in-house construction and as a product to deliver to other organizations. Exercises and operations have thus far shown that the concept is viable, but Seabee Engineer Reconnaissance Teams have encountere...

  2. National Ignition Facility Control and Information System Operational Tools

    Energy Technology Data Exchange (ETDEWEB)

    Marshall, C D; Beeler, R G; Bowers, G A; Carey, R W; Fisher, J M; Foxworthy, C B; Frazier, T M; Mathisen, D G; Lagin, L J; Rhodes, J J; Shaw, M J

    2009-10-08

    The National Ignition Facility (NIF) in Livermore, California, is the world's highest-energy laser fusion system and one of the premier large scale scientific projects in the United States. The system is designed to setup and fire a laser shot to a fusion ignition or high energy density target at rates up to a shot every 4 hours. NIF has 192 laser beams delivering up to 1.8 MJ of energy to a {approx}2 mm target that is planned to produce >100 billion atm of pressure and temperatures of >100 million degrees centigrade. NIF is housed in a ten-story building footprint the size of three football fields as shown in Fig. 1. Commissioning was recently completed and NIF will be formally dedicated at Lawrence Livermore National Laboratory on May 29, 2009. The control system has 60,000 hardware controls points and employs 2 million lines of control system code. The control room has highly automated equipment setup prior to firing laser system shots. This automation has a data driven implementation that is conducive to dynamic modification and optimization depending on the shot goals defined by the end user experimenters. NIF has extensive facility machine history and infrastructure maintenance workflow tools both under development and deployed. An extensive operational tools suite has been developed to support facility operations including experimental shot setup, machine readiness, machine health and safety, and machine history. The following paragraphs discuss the current state and future upgrades to these four categories of operational tools.

  3. Testing market informational efficiency of Constanta port operators

    Science.gov (United States)

    Roşca, E.; Popa, M.; Ruscă, F.; Burciu, Ş.

    2015-11-01

    The Romanian capital market is still an emergent one. Following the mass- privatization process and the private investments, three of the most important handling and storage companies acting in Constantza Port (OIL Terminal, Comvex and SOCEP) are listed on Romanian Stock Exchange. The paper investigates their evolution on the market, identifying the expected rate of return and the components of the shares risk (specific and systematic). Also, the price evolution could be analyzed through the informational efficiency which instantly reflects the price relevance. The Jarque-Bera normality test regarding the shares return rate distribution and the Fama test for the informational efficiency are completed for each company. The market price model is taken into consideration for price forecasting, computing the return rate auto-correlations. The results are subject of interpretation considering additional managerial and financial information of the companies’ activity.

  4. Global Geologic Mapping of Io: Preliminary Results

    Science.gov (United States)

    Williams, David A.; Keszthelyi, L. P.; Crown, D. A.; Geissler, P. E.; Schenk, P. M.; Yff, Jessica; Jaeger, W. L.; Rathbun, J. A.

    2008-01-01

    A new global geologic map of Jupiter's volcanic moon, Io is being prepared, with the focus being on completion of a draft map by July 2008. Here initial results of the mapping are reported: a preliminary distribution of material units in terms of areas and a visual representation. Additionally, the mapping hopes to address some of the problems in Io geology. Thus far it has been discovered that Io's surface is dominated by plains material, thought to consist of Io's silicate crust covered by pyroclastic deposits and lava flows of silicate and sulfur-bearing composition. Many plains areas contain flow fields that cannot be mapped separately due to a lack of resolution or modification by alteration processes. Discrete lava flows and flow fields are the next most abundant unit, with bright (sulfur?) flows in greater abundance than dark (silicate?) flows. The source of most of Io's heat flow, the paterae, are the least abundant unit in terms of areal extent.Upon completion of the draft map for peer review, it will be used to investigate several specific questions about the geological evolution of Io that previously could not be well addressed, including: comparison of the areas versus the heights of Ionian mountains to assess their stability and evolution; correlation and comparison of Galileo Near-Infrared Mapping Spectrometer and Photopolarimeter-Radiometer hot spot locations with the mapped location of dark versus bright lava flows and patera floors to assess any variations in the types of sources for Io's active volcanism; and the creation of a global inventory of the areal coverage of dark and bright laval flows to assess the relative importance of sulfur versus silicate volcanism in resurfacing Io, and to assess whether there are regional concentrations of either style of volcanism that may have implications on interior processes.

  5. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  6. Ultrascalable Techniques Applied to the Global Intelligence Community Information Awareness Common Operating Picture (IA COP)

    National Research Council Canada - National Science Library

    Valdes, Alfonso; Kadte, Jim

    2005-01-01

    The focus of this research is to develop detection, correlation, and representation approaches to address the needs of the Intelligence Community Information Awareness Common Operating Picture (IA COP...

  7. INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dodaro, Gene

    1998-01-01

    .... Our most recent report, done at the request of this Committee, delineates the serious information security weaknesses placing critical operations and assets at risk and outlines actions needed...

  8. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  9. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  10. Case Studies on UN Information Operations: Ethiopia, Liberia, and Kosovo

    Science.gov (United States)

    2012-09-01

    Peacekeeping (IODP). The goal of peacebuilding, in general, is a change in the community from conflict and hatred to peace and tranquility . IODP can make...for message dissemination and peace propaganda.86 A culture steeped in the oral tradition is another peculiar feature in Liberia where people of rural...areas share the media information with family, friends, and neighbors. Due to the lack of a comprehensive media, only through oral dissemination

  11. 76 FR 50152 - Airworthiness Directives; Lycoming Engines (L)O-360, (L)IO-360, AEIO-360, O-540, IO-540, AEIO-540...

    Science.gov (United States)

    2011-08-12

    ...)O-360, (L)IO-360, AEIO-360, O-540, IO-540, AEIO-540, (L)TIO-540, IO-580, and IO-720 Series... 2006-20-09, Amendment 39-14778 (71 FR 57407, September 29, 2006), for Lycoming Engines (L)O-360, (L)IO-360, AEIO-360, O-540, IO-540, AEIO-540, (L)TIO-540, IO-580, and IO-720 series reciprocating engines...

  12. Secure Information Exchange Gateway for Electric Grid Operations

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, F. Russell [Grid Protection Alliance, Chattanooga, TN (United States); Carroll, J. Ritchie [Grid Protection Alliance, Chattanooga, TN (United States); Sanders, William [Univ. of Illinois, Urbana-Champaign, IL (United States); Yardley, Timothy [Univ. of Illinois, Urbana-Champaign, IL (United States); Heine, Erich [Univ. of Illinois, Urbana-Champaign, IL (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Motteler, Barbara [Alstom Grid Inc., Levallois-Perret Cedex (France); Giri, Jay [Grid Protection Alliance, Chattanooga, TN (United States); Walker, William [PJM Interconnection (PJM), Norristown, PA (United States); McCartha, Esrick [PJM Interconnection (PJM), Norristown, PA (United States)

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  13. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  14. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  15. Navigation and Alignment Aids Concept of Operations and Supplemental Design Information. Revision A

    Science.gov (United States)

    Kelly, Sean M.; Cryan, Scott P.

    2016-01-01

    The IDSS Navigation and Alignment Aids Concept of Operations and Supplemental Design Information document provides supplemental information to the IDSS IDD. The guide provides insight into the navigation and alignment aids design, and how those aids can be utilized by incoming vehicles for proximity operations and docking. The navigation aids are paramount to successful docking.

  16. 76 FR 3175 - Proposed Extension of Existing Information Collection; Hoist Operators' Physical Fitness

    Science.gov (United States)

    2011-01-19

    ...' Physical Fitness AGENCY: Mine Safety and Health Administration, Labor. ACTION: Notice of request for public... collection of information in 30 CFR 56.19057 and 57.19057--Hoist Operators' Physical Fitness. MSHA does not... extension of the information collection for 30 CFR 56.19057 and 57.19057 on hoist operators' physical...

  17. Sensitivity analysis of an information fusion tool: OWA operator

    Science.gov (United States)

    Zarghaami, Mahdi; Ardakanian, Reza; Szidarovszky, Ferenc

    2007-04-01

    The successful design and application of the Ordered Weighted Averaging (OWA) method as a decision making tool depend on the efficient computation of its order weights. The most popular methods for determining the order weights are the Fuzzy Linguistic Quantifiers approach and the Minimal Variability method which give different behavior patterns for OWA. These methods will be compared by using Sensitivity Analysis on the outputs of OWA with respect to the optimism degree of the decision maker. The theoretical results are illustrated in a water resources management problem. The Fuzzy Linguistic Quantifiers approach gives more information about the behavior of the OWA outputs in comparison to the Minimal Variability method. However, in using the Minimal Variability method, the OWA has a linear behavior with respect to the optimism degree and therefore it has better computation efficiency.

  18. 78 FR 64526 - Information Collection Activities: Sulphur Operations; Submitted for Office of Management and...

    Science.gov (United States)

    2013-10-29

    ...: Sulphur Operations; Submitted for Office of Management and Budget (OMB) Review; Comment Request ACTION: 30... paperwork requirements in the regulations under Subpart P, Sulphur Operations. This notice also provides the..., Currently Under Review). SUPPLEMENTARY INFORMATION: Title: 30 CFR 250, Subpart P, Sulphur Operations. OMB...

  19. 47 CFR 64.707 - Public dissemination of information by providers of operator services.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Public dissemination of information by providers of operator services. 64.707 Section 64.707 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Enhanced Services and Customer-Premises Equipment by Bell Operating Companies; Telephone Operator Services...

  20. Design and Implementation of Henan Huinong Client System Based on iOS

    Directory of Open Access Journals (Sweden)

    Li Yan-Ling

    2016-01-01

    Full Text Available In order to meet the demands of customers related to agriculture who can obtain some Comprehensive agricultural information service of Henan Province through the intelligent mobile terminal, on the base of the Zhong yuan Rural Information Port integrated platform, employing IOS, Java, Eclipse, XML, SAX technology, we designed and developed Henan Huinong client systems based on ios mobile terminal. This system has achieved the multiple applications, such as agricultural information browsing, network consulting, expert online, crop rermote diagnosis and so on.

  1. iOS Forenzní analýza iPad, iPhone, iPod

    OpenAIRE

    PLACHOTŇUK, Artem

    2014-01-01

    Thesis "iOS Forensic Analysis iPad, iPhone, iPod" deals with the forensic analysis of mobile devices running iOS. This paper will describe a specific OS iOS devices with this operating system. Next will be described the capabilities and limitations which have these devices in relation to forensic analysis. These findings are then illustrated on a physical device and on the basis of best practices will be designed for forensic analysis of these devices and the findings will be evaluated.

  2. AUDIT DISCLOSURE OF MATERIAL INFORMATION ON OPERATING SEGMENTS THE ACTIVITIES OF THE ORGANIZATIONS OF TOURIST SPHERE

    Directory of Open Access Journals (Sweden)

    Екатерина Николаевна Скорикова

    2013-04-01

    Full Text Available In modern conditions market economy for take decisions of use services tourist organizations, users not enough relevant information of financial result activities.The article considered audit disclosure relevant information on operating segments activities, for example tourist organizations.In result research considered operating segments on current and discontinued activities, and their impact on disclosure relevant information of financial result.Proposed option disclosure relevant information on operating segments activities in explanatory Note to the annual financial statements.Received results prove, that information on operating segments activities essential in all aspects.Results research has as theoretical so and practical significance, and can used at further development theoretical and practical questions on disclosure relevant information of activities organizations of tourist sphere.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-2

  3. Relevance- and Aggregation-based Scheduling for Data Transmission in IEEE 802.15.4e IoT Networks

    OpenAIRE

    Subedi, Matrika; Ezennabuike, Nonso Japhet

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Internet of thing (IoT) is regarded as a new communicating paradigm with Internet connectivity enabling embedded devices to interact with each other on a global scale. IoT has the potential to become the largest producer of information because of a massive number of connected devices with diverse applications ranging from environmental monitoring, home, and building automation. This ubiquitous conne...

  4. MedAd-AppQ: A quality assessment tool for medication adherence apps on iOS and android platforms.

    Science.gov (United States)

    Ali, Eskinder Eshetu; Teo, Amanda Kai Sin; Goh, Sherlyn Xue Lin; Chew, Lita; Yap, Kevin Yi-Lwern

    2018-02-02

    With the recent proliferation of smartphone medication adherence applications (apps), it is increasingly more difficult for patients and clinicians to identify the most useful app. To develop a quality assessment tool for medication adherence apps, and evaluate the quality of such apps from the major app stores. In this study, a Medication Adherence App Quality assessment tool (MedAd-AppQ) was developed and two evaluators independently assessed apps that fulfilled the following criteria: availability in English, had at least a medication reminder feature, non-specific to certain disease conditions (generic apps), free of technical malfunctions and availability on both the iPhone Operating System (iOS) and Android platforms. Descriptive statistics, Mann-Whitney U test, Pearson product moment correlation and Spearman rank-order correlation were used for statistical analysis. MedAd-AppQ was designed to have 24 items (total 43 points) categorized under three sections: content reliability (11 points), feature usefulness (29 points) and feature convenience (3 points). The three sections of MedAd-AppQ were found to have inter-rater correlation coefficients of 0.801 (p-value apps (27 iOS and 25 Android), quality scores ranged between 7/43 (16.3%) and 28/43 (65.1%). There was no significant difference between the quality scores of the Android and iOS versions. None of the apps had features for self-management of side effects. Only two apps in each platform provided disease-related and/or medication information. MedAd-AppQ can be used to reliably assess the quality of adherence apps. Clinicians can use the tool in selecting apps for use by patients. Developers of adherence apps should consider features that provide therapy-related information and help patients in medications and side-effects management. Copyright © 2018 Elsevier Inc. All rights reserved.

  5. [Design and Implementation of a Mobile Operating Room Information Management System Based on Electronic Medical Record].

    Science.gov (United States)

    Liu, Baozhen; Liu, Zhiguo; Wang, Xianwen

    2015-06-01

    A mobile operating room information management system with electronic medical record (EMR) is designed to improve work efficiency and to enhance the patient information sharing. In the operating room, this system acquires the information from various medical devices through the Client/Server (C/S) pattern, and automatically generates XML-based EMR. Outside the operating room, this system provides information access service by using the Browser/Server (B/S) pattern. Software test shows that this system can correctly collect medical information from equipment and clearly display the real-time waveform. By achieving surgery records with higher quality and sharing the information among mobile medical units, this system can effectively reduce doctors' workload and promote the information construction of the field hospital.

  6. 42 CFR 433.116 - FFP for operation of mechanized claims processing and information retrieval systems.

    Science.gov (United States)

    2010-10-01

    ... and information retrieval systems. 433.116 Section 433.116 Public Health CENTERS FOR MEDICARE... FISCAL ADMINISTRATION Mechanized Claims Processing and Information Retrieval Systems § 433.116 FFP for operation of mechanized claims processing and information retrieval systems. (a) Subject to 42 CFR 433.113(c...

  7. Multi-fields' coordination information integrated platform for nuclear power plant operation preparation

    International Nuclear Information System (INIS)

    Yuan Chang; Li Yong; Ye Zhiqiang

    2011-01-01

    To realize the coordination in multi-fields' work and information sharing, by applying the method of Enterprise Architecture (EA), the business architecture, functional flow and application architecture of Nuclear Power Plant's operation preparation information integrated platform are designed, which can realize the information sharing and coordination of multi fields. (authors)

  8. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  9. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  10. AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices

    Directory of Open Access Journals (Sweden)

    Luis Gómez-Miralles

    2015-01-01

    data they may store, opens new opportunities in the field of computer forensics. In 2010, version 4 of the iOS operating system introduced AirPrint, a simple and driverless wireless printing functionality supported by hundreds of printer models from all major vendors. This paper describes the traces left in the iOS device when AirPrint is used and presents a method for recovering content and metadata of documents that have been printed.

  11. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    OpenAIRE

    Freyberger Michael; He Warren; Akhawe Devdatta; Mazurek Michelle L.; Mittal Prateek

    2018-01-01

    An important line of privacy research is investigating the design of systems for secure input and output (I/O) within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper wi...

  12. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  13. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  14. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  15. An information offering system for operation support based on plant functional structure

    International Nuclear Information System (INIS)

    Ohga, Yukiharu; Seki, Hiroshi

    1995-01-01

    A plant information offering system was proposed to support operators in their selection and confirmation of the required information for plant operation under transient conditions in nuclear power plants. The system features include an automatic selection method for information and a dialog input method. The former selects plant information in response to plant status changes and operators' demands. The selection is performed based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. In the latter, both speech and CRT touch inputs are transformed into words in Japanese to realize an arbitrary input mode combination. The words are analyzed as a sentence before transforming them into a demand for related programs. A prototype system was evaluated using a BWR simulator, assuming abnormal transients such as loss of feedwater. The contents of the offered information were checked based on emergency operation guidelines. It was confirmed that appropriate information items are automatically selected in real time. Answers are generated in reply to the operators' demands. They include information added to reflect the plant conditions. As for dialog, simple and quick input is realized by combining speech and CRT touch according to the operating situation. (author)

  16. Intra-operative 3-T MRI for paediatric brain tumours: challenges and perspectives

    International Nuclear Information System (INIS)

    Abernethy, L.J.; Avula, S.; Hughes, G.M.; Wright, E.J.; Mallucci, C.L.

    2012-01-01

    MRI is the ideal modality for imaging intracranial tumours. Intraoperative MRI (ioMRI) makes it possible to obtain scans during a neurosurgical operation that can aid complete macroscopic tumour resection - a major prognostic factor in the majority of brain tumours in children. Intra-operative MRI can also help limit damage to normal brain tissue. It therefore has the potential to improve the survival of children with brain tumours and to minimise morbidity, including neurological deficits. The use of ioMRI is also likely to reduce the need for second look surgery, and may reduce the need for chemotherapy and radiotherapy. High-field MRI systems provide better anatomical information and also enable effective utilisation of advanced MRI techniques such as perfusion imaging, diffusion tensor imaging, and magnetic resonance spectroscopy. However, high-field ioMRI facilities require substantial capital investment, and careful planning is required for optimal benefit. Safe ioMRI requires meticulous attention to detail and rigorous application of magnetic field safety precautions. Interpretation of ioMRI can be challenging and requires experience and understanding of artefacts that are common in the intra-operative setting. (orig.)

  17. Visualization and parallel I/O at extreme scale

    International Nuclear Information System (INIS)

    Ross, R B; Peterka, T; Shen, H-W; Hong, Y; Ma, K-L; Yu, H; Moreland, K

    2008-01-01

    In our efforts to solve ever more challenging problems through computational techniques, the scale of our compute systems continues to grow. As we approach petascale, it becomes increasingly important that all the resources in the system be used as efficiently as possible, not just the floating-point units. Because of hardware, software, and usability challenges, storage resources are often one of the most poorly used and performing components of today's compute systems. This situation can be especially true in the case of the analysis phases of scientific workflows. In this paper we discuss the impact of large-scale data on visual analysis operations and examine a collection of approaches to I/O in the visual analysis process. First we examine the performance of volume rendering on a leadership-computing platform and assess the relative cost of I/O, rendering, and compositing operations. Next we analyze the performance implications of eliminating preprocessing from this example workflow. Then we describe a technique that uses data reorganization to improve access times for data-intensive volume rendering

  18. Information sharing guidebook for transportation management centers, emergency operations centers, and fusion centers.

    Science.gov (United States)

    2010-06-01

    This guidebook provides an overview of the mission and functions of transportation management centers, emergency operations centers, and fusion centers. The guidebook focuses on the types of information these centers produce and manage and how the sh...

  19. Information Operations: The Least Applied Element of U.S. National Power

    National Research Council Canada - National Science Library

    Ferguson, Quill

    2004-01-01

    Information operations, one of the four elements of U.S. national power, is supreme in defending the country against foreign or domestic adversaries and winning hearts and minds both at home and internationally...

  20. The War of Ideas and the Role of Information Operations in Counterinsurgency

    National Research Council Canada - National Science Library

    Hunton, Collin T

    2008-01-01

    .... Given the influence of policy at home and abroad within the asymmetric nature of COIN operations, a review of Clausewitz's theory of political conflict will help us understand the role of information...

  1. DOD FINANCIAL MANAGEMENT: More Reliable Information Key to Assuring Accountability and Managing Defense Operations More Efficiently

    National Research Council Canada - National Science Library

    1999-01-01

    .... These problems not only hamper the department's ability to produce timely and accurate financial management information, but also significantly impair efforts to improve the economy and efficiency of its operations...

  2. Information sharing guidebook for transportation management centers, emergency operations centers, and fusion centers

    Science.gov (United States)

    2010-06-01

    This guidebook provides an overview of the mission and functions of transportation management centers, emergency operations centers, and fusion centers. The guidebook focuses on the types of information these centers produce and manage and how the sh...

  3. 77 FR 12244 - Proposed Information Collection; Comment Request; Report of Whaling Operations

    Science.gov (United States)

    2012-02-29

    ... Whaling Operations AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION... current information collection. Native Americans may conduct certain aboriginal subsistence whaling in accordance with the provisions of the International Whaling Commission (IWC). In order to respond to...

  4. Massing Effects in the Information Domain: A Case Study in Aggressive Information Operations

    National Research Council Canada - National Science Library

    Metz, Thomas F; Garrett, Mark W; Hutton, James E; Bush, Timothy W

    2006-01-01

    In 1995, the Department of the Army, Forces Command, and the Training and Doctrine Command began a joint venture called Force XXI, the focus of which was to understand how information-age technology could improve the U.S...

  5. A remote control system to offer information for nuclear power plant operation

    International Nuclear Information System (INIS)

    Ohga, Yukiharu; Yuchi, Hiroyuki; Arita, Setsuo

    1995-01-01

    A new man-machine system was proposed to simplify input operation so as to get needed plant information and to control information items and output devices for the operator crew, working in a control room. The system controls the shared information for the operator crew, on a large screen display, and private information for individual operators and maintenance personnel, on CRTs, based on the speech input and remote pointing input to the large screen display by a portable pointer, which emits laser beams. The system recognizes the indicating point of the pointer beam by processing the image on the large screen as obtained by an ITV camera. An infrared laser beam and a camera with a visible ray cut filter are used to remove distortion of the image caused by lens aberration, etc. and to provide rapid image processing. The operator performs the input operation while monitoring a cursor displayed by the system. The information items offered and their output devices are automatically determined according to the input operator. A prototype system was developed using three CRTs, one of which served as a substitute for the large screen display. Input to the system is performed using a speech input device and three kinds of pointers; each pointer is identified during image processing based on the number of laser beams emitted. The evaluation test confirmed that precise and smooth input by pointers as well as arbitrary combinations with speech input realized natural dialog without being aware of any waiting time. The appropriate information items were offered to output devices, CRTs and the speech output device, according to the pointers used, namely the input operators. The system can simplify input operation and effectively control the offered information items and output devices in a plant control room. (author)

  6. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  7. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2016-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  8. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  9. Intraosseous vascular access in adults using the EZ-IO in an emergency department.

    Science.gov (United States)

    Ngo, Adeline Su-Yin; Oh, Jen Jen; Chen, Yuming; Yong, David; Ong, Marcus Eng Hock

    2009-08-11

    Intraosseous (IO) access is an alternative to conventional intravenous access. We evaluate the use of the EZ-IO as an alternative vascular access for patients in the emergency department. A non-randomized, prospective, observational study was performed in adults using the EZ-IO powered drill device. Twenty-four patients were recruited. There were 35 intraosseous insertions, including 24 tibial and 11 humeral insertions. All EZ-IO insertions were achieved within 20 s and were successful at the first attempt except for one. Of the intraosseous insertions, 88.6% were reported to be easier than intravenous cannulation. We found flow rates to be significantly faster using a pressure bag. The seniority of operators did not affect the success of insertion. Complications included a glove being caught in the drill device and extravasation of fluid although they were easily preventable. The use of the EZ-IO provides a fast, easy and reliable alternative mode of venous access, especially in the resuscitation of patients with no venous vascular access in the emergency department. Flow rates may be improved by the use of pressure bags.

  10. Improving machine operation management efficiency via improving the vehicle park structure and using the production operation information database

    Science.gov (United States)

    Koptev, V. Yu

    2017-02-01

    The work represents the results of studying basic interconnected criteria of separate equipment units of the transport network machines fleet, depending on production and mining factors to improve the transport systems management. Justifying the selection of a control system necessitates employing new methodologies and models, augmented with stability and transport flow criteria, accounting for mining work development dynamics on mining sites. A necessary condition is the accounting of technical and operating parameters related to vehicle operation. Modern open pit mining dispatching systems must include such kinds of the information database. An algorithm forming a machine fleet is presented based on multi-variation task solution in connection with defining reasonable operating features of a machine working as a part of a complex. Proposals cited in the work may apply to mining machines (drilling equipment, excavators) and construction equipment (bulldozers, cranes, pile-drivers), city transport and other types of production activities using machine fleet.

  11. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  12. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  13. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availa...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices.......The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...

  14. Operation environment construction of geological information database for high level radioactive waste geological disposal

    International Nuclear Information System (INIS)

    Wang Peng; Gao Min; Huang Shutao; Wang Shuhong; Zhao Yongan

    2014-01-01

    To fulfill the requirements of data storage and management in HLW geological disposal, a targeted construction method for data operation environment was proposed in this paper. The geological information database operation environment constructed by this method has its unique features. And it also will be the important support for HLW geological disposal project and management. (authors)

  15. 76 FR 4993 - Agency Information Collection; Activity Under OMB Review; Report of Financial and Operating...

    Science.gov (United States)

    2011-01-27

    ... in the community, reliability of service, financial stability and cost structure of the air carrier...] Agency Information Collection; Activity Under OMB Review; Report of Financial and Operating Statistics... continuing need for and usefulness of BTS collecting financial, traffic and operating statistics from small...

  16. Combining Operations Management and Information Systems Curricula: Assessing Alumni Preparations for the Workforce

    Science.gov (United States)

    Silva, David; McFadden, Kathleen L.

    2005-01-01

    The purpose of this study is to explore how well a curriculum that combines operations management and information systems uniquely prepares students for the workforce. To address our research questions, a Web-based survey was developed. We sent our survey to 203 alumni that graduated from the Department of Operations Management and Information…

  17. 75 FR 29568 - Extension of Agency Information Collection Activity Under OMB Review: Aircraft Operator Security

    Science.gov (United States)

    2010-05-26

    ... all passengers. The passenger watch list checks currently conducted by aircraft operators will soon be.... These programs require aircraft operators to maintain and update records to ensure compliance with... information collected to determine compliance with 49 CFR part 1544 and to ensure the freedom of movement for...

  18. 78 FR 44900 - Communication of Operational Information Between Natural Gas Pipelines and Electric Transmission...

    Science.gov (United States)

    2013-07-25

    ... transmission operators and interstate natural gas pipelines. The Commission intends to remove any barriers to...-17-000] Communication of Operational Information Between Natural Gas Pipelines and Electric... the Commission's regulations to provide explicit authority to interstate natural gas pipelines and...

  19. Sodium D-line emission from Io - Synoptic observations from Table Mountain Observatory

    Science.gov (United States)

    Bergstralh, J. T.; Matson, D. L.; Johnson, T. V.

    1975-01-01

    We report the first results of a program initiated at Table Mountain Observatory to study the time variation of the sodium D-line emission around Io. During 1974 July and August, 51 spectra were obtained. These data demonstrate that (1) the sodium emission is highly correlated with Io's orbital position, (2) the gross temporal and amplitude characteristics of the emission are explained if resonance scattering of sunlight is the dominant excitation mechanism, (3) the emission is not directly related to dekametric noise storms from Jupiter, (4) an upper limit of 130 kR is placed on any constant near-surface (auroral) source of emission, (5) a steady-state source of sodium operated during our 7-week observing interval, (6) the sodium cloud is probably distributed in a partial toroid, possibly with more sodium leading than trailing Io, and (7) the D-line emission does not depend strongly on the solar phase angle.

  20. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  1. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  2. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Science.gov (United States)

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  3. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  4. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  5. Stream-based Reasoning for IoT Applications – Proposal of Architecture and Analysis of Challenges

    OpenAIRE

    Endler , Markus ,; Briot , Jean-Pierre ,; De Almeida , Vitor ,; Dos Reis , Ruhan ,; Silva e Silva , Francisco

    2017-01-01

    Special issue of the SMC'17 Workshop.To appear in 2017.; International audience; As distributed IoT applications become larger and more complex, the pure processing of raw sensor and actuation data streams becomes impractical. Instead, data streams must be fused into tangible facts and these pieces of information must be combined with a background knowledge to infer new pieces of knowledge. And since many IoT applications require almost real-time reactivity to stimulus of the environment, suc...

  6. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    The Video PHY controller offers an interface between transmitters/receivers and video ports. These video ports are categorized in HDMI or Displayport. HDMI Video PHY controller are mostly used for their high speed operation for high resolution graphics. However, the execution of high resolution...... graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...

  7. Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS

    Directory of Open Access Journals (Sweden)

    Angga Apridianto

    2015-08-01

    Full Text Available Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned through pictures and visit the location of art and culture directly make the introduction of art and culture to people of indonesia not yet optimal. Therefore required a media so that people can learn more about the wealth of art and culture without having to visit directly into the location of the arts and cultures its. “Keliling Nusantara Edisi Sumatra” application that was built can be the way to preserve the national culture. The function of this application as a learning media for recognize the diversity of arts and cultures of Indonesia on the island of Sumatra. This application is built using Mobione Studio and running on Android and iOS devices. The application is made using the UCD (User Centered Design which has been mapped to multimedia development methods by Luther from the stage specify the context of use and specify the users and organisational requirements are mapped into the concept, the stage produce design solutions are mapped into the design, production and collecting material as wellas the evaluate design againts the user requirements are mapped into the stage of testing and distribution. The results produced an application based on Android and iOS contains folks song and lyrics and sound, traditional dress, traditional homes, custom traditions, traditional weapons, traditional dance, tradition musical instrument, the symbol of the

  8. The integrated business information system: using automation to monitor cost-effectiveness of park operations

    Science.gov (United States)

    Dick Stanley; Bruce Jackson

    1995-01-01

    The cost-effectiveness of park operations is often neglected because information is laborious to compile. The information, however, is critical if we are to derive maximum benefit from scarce resources. This paper describes an automated system for calculating cost-effectiveness ratios with minimum effort using data from existing data bases.

  9. 77 FR 42004 - Proposed Extension of Existing Information Collection; Main Fan Operation and Inspection in Gassy...

    Science.gov (United States)

    2012-07-17

    ... provided in the desired format, reporting burden (time and financial resources) is minimized, collection... Extension of Existing Information Collection; Main Fan Operation and Inspection in Gassy Underground Metal... agencies with an opportunity to comment on proposed and continuing collections of information in accordance...

  10. 39 CFR 3.6 - Information furnished to Board-financial and operating reports.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Information furnished to Board-financial and operating reports. 3.6 Section 3.6 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE BOARD OF GOVERNORS (ARTICLE III) § 3.6 Information furnished to Board—financial...

  11. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  12. Technology and Policy Challenges in the Adoption and Operation of Health Information Exchange Systems.

    Science.gov (United States)

    Ji, Hyerim; Yoo, Sooyoung; Heo, Eun-Young; Hwang, Hee; Kim, Jeong-Whun

    2017-10-01

    This study aimed to identify problems and issues that arise with the implementation of online health information exchange (HIE) systems in a medical environment and to identify solutions to facilitate the successful operation of future HIE systems in primary care clinics and hospitals. In this study, the issues that arose during the establishment and operation of an HIE system in a hospital were identified so that they could be addressed to enable the successful establishment and operation of a standard-based HIE system. After the issues were identified, they were reviewed and categorized by a group of experts that included medical information system experts, doctors, medical information standard experts, and HIE researchers. Then, solutions for the identified problems were derived based on the system development, operation, and improvement carried out during this work. Twenty-one issues were identified during the implementation and operation of an online HIE system. These issues were then divided into four categories: system architecture and standards, documents and data items, consent of HIE, and usability. We offer technical and policy recommendations for various stakeholders based on the experiences of operating and improving the online HIE system in the medical field. The issues and solutions identified in this study regarding the implementation and operate of an online HIE system can provide valuable insight for planners to enable them to successfully design and operate such systems at a national level in the future. In addition, policy support from governments is needed.

  13. A work process and information flow description of control room operations

    International Nuclear Information System (INIS)

    Davey, E.; Matthews, G.

    2007-01-01

    The control room workplace is the location from which all plant operations are supervised and controlled on a shift-to-shift basis. The activities comprising plant operations are structured into a number of work processes, and information is the common currency that is used to convey work requirements, communicate business and operating decisions, specify work practice, and describe the ongoing plant and work status. This paper describes the motivation for and early experience with developing a work process and information flow model of CANDU control room operations, and discusses some of the insights developed from model examination that suggest ways in which changes in control centre work specification, organization of resources, or asset layout could be undertaken to achieve operational improvements. (author)

  14. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  15. An Open Virtual Neighbourhood Network to Connect IoT Infrastructures and Smart Objects – VICINITY

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2017-01-01

    The lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of isolated islands that do...... not constitute a real Internet, preventing the exploitation of the huge potential expected by Information and communications technology (ICT) visionaries and unfolding business opportunities facilitated by digitalization and automation. The VICINITY project will build and demonstrate a platform linking various...

  16. Information diffused by the operator on the nuclear risk: which answer to stakeholders expectations?

    International Nuclear Information System (INIS)

    Plot-Vicard, Emmanuelle

    2010-01-01

    This research thesis addresses the practices of environmental information diffusion, and aims at identifying the possible discrepancies between information diffused by a company and the expectations of stakeholders, more particularly in the case of the nuclear risk. The first part presents the theoretical framework (notably the legitimacy theory) and determines the expectations of stakeholders as far as information on the nuclear risk is concerned. The second part describes and discusses information on nuclear risk diffused by operators in their annual reports, proposes an assessment of this information, and relates this assessment with the previous theoretical framework

  17. ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the core techniques in 5G, the Internet of Things (IoT is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.

  18. Defense Science Board 2006 Summer Study on Information Management for Net-Centric Operations. Volume 1: Main Report

    National Research Council Canada - National Science Library

    Schneider, Jr, William

    2007-01-01

    The task force addressed combat operations, information management, information assurance, and architecture requirements, as well as the architecture framework currently being pursued by the department...

  19. The nuclear industry's transition to risk-informed regulation and operation in the United States

    International Nuclear Information System (INIS)

    Kadak, Andrew C.; Matsuo, Toshihiro

    2007-01-01

    This paper summarizes a study of the transition of the United States nuclear industry from a prescriptive regulatory structure to a more risk informed approach to operations and regulations. The transition occurred over a 20 yr period in which gradual changes were made in the fundamental regulations and to the approach to nuclear safety and operations. While the number of actual regulatory changes were few, they are continuing. The utilities that embraced risk informed operations made dramatic changes in the way they approached operations and outage management. Those utilities that used risk in operations showed dramatic improvement in safety based on Institute of Nuclear Power Operations (INPO) performance indicators. It was also shown that the use of risk did not negatively affect safety performance of the plants compared to standard prescriptive approaches. This was despite having greater flexibility in compliance to regulatory standards and the use of the newly instituted risk-informed reactor oversight process. Key factors affecting the successful transition to a more risk-informed approach to regulations and operations are: strong top management support and leadership both at the regulator and the utility; education and training in risk principles and probabilistic risk Assessment tools for engineers, operators and maintenance staff; a slow and steady introduction of risk initiatives in areas that can show value to both the regulator and the industry; a transparent regulatory foundation built around a safety goal policy and the development of a strong safety culture at the utility to allow for more independence in safety compliance and risk management. The experience of the United States shows positive results in both safety and economics. The INPO and NRC metrics presented show that the use of risk information in operations and regulation is marginally better with no degradation in safety when plants that have embraced risk-informed approaches are compared

  20. Operational Risk Aggregation Based on Business Line Dependence: A Mutual Information Approach

    Directory of Open Access Journals (Sweden)

    Wenzhou Wang

    2016-01-01

    Full Text Available The dependencies between different business lines of banks have serious effects on the accuracy of operational risk estimation. Furthermore, the dependencies are far more complicated than simple linear correlation. While Pearson correlation coefficient is constructed based on the hypothesis of a linear association, the mutual information that measures all the information of a random variable contained in another random variable is a powerful alternative. Based on mutual information, the generalized correlation coefficient which can capture both linear and nonlinear correlation can be derived. This paper models the correlation between business lines by mutual information and normal copula. The experiment on a real-world Chinese bank operational risk data set shows that using mutual information to model the dependencies between business lines is more reasonable than linear correlation.

  1. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  2. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  3. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  4. On the Value of Structural Health Monitoring Information for the Operation of Wind Parks

    DEFF Research Database (Denmark)

    Thöns, Sebastian; Faber, Michael H.; Val, Dimitri V.

    2017-01-01

    In the present paper, an approach for the quantification of the Value of Structural Health Monitoring (SHM) Information building upon a framework for infrastructure system utility and decision analysis is developed and applied to the operation of wind parks. The quantification of the value of SHM...... wind turbine systems and its components is developed accounting for the wind park functionality, i.e. power production, its operation and its cascading damage and failure scenarios. This system model facilitates to quantify the expected benefits and risks throughout the service life accounting...... for the propagation of SHM information and uncertainties from components to the different system levels and vice versa. The decision to extend the service life and the operation of a wind park is investigated without SHM information and by quantifying the value of several SHM strategies....

  5. Seedbed based on IoT: A Case Study

    Directory of Open Access Journals (Sweden)

    J. Kalathas

    2016-05-01

    Full Text Available Nowadays, the Wireless Sensors Network (WSN and the Internet of Things (IOT are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed breeding procedure. Using the basic principles of Internet and WSN technology, precision agriculture systems based on the Internet of Things (IoT technology are explained in detail, especially in network architecture, hardware architecture and software process control of the precision seed breeding monitoring system. The implemented automation system monitors data from the sensors in a feedback loop which activates the control devices based on threshold value. The implementation of WSN in seedbed monitoring (SM will optimize the control of air temperature and humidity, soil humidity, air capacity, luminance while it will minimize the time of seed breeding and it will also maximize the number of seeds which become plants ready for transplantation.

  6. Ridges and tidal stress on Io

    Science.gov (United States)

    Bart, G.D.; Turtle, E.P.; Jaeger, W.L.; Keszthelyi, L.P.; Greenberg, R.

    2004-01-01

    Sets of ridges of uncertain origin are seen in twenty-nine high-resolution Galileo images, which sample seven locales on Io. These ridges are on the order of a few kilometers in length with a spacing of about a kilometer. Within each locale, the ridges have a consistent orientation, but the orientations vary from place to place. We investigate whether these ridges could be a result of tidal flexing of Io by comparing their orientations with the peak tidal stress orientations at the same locations. We find that ridges grouped near the equator are aligned either north-south or east-west, as are the predicted principal stress orientations there. It is not clear why particular groups run north-south and others east-west. The one set of ridges observed far from the equator (52?? S) has an oblique azimuth, as do the tidal stresses at those latitudes. Therefore, all observed ridges have similar orientations to the tidal stress in their region. This correlation is consistent with the hypothesis that tidal flexing of Io plays an important role in ridge formation. ?? 2004 Elsevier Inc. All rights reserved.

  7. The role of information technology (IT) in reducing offshore operating costs

    International Nuclear Information System (INIS)

    Stern, M.J.

    1993-01-01

    The rapid changes in information technology (IT) and its application have helped to improve efficiency and reduce operating costs offshore. Developments in IT itself, in terms of technology, organization and standards together with cultural change have created new opportunities. In the application of IT, the most significant impact on operations costs and effectiveness has come from the use of information throughout the life cycle, and improved telecommunications. This paper describes recent developments in IT and its application, and cites examples where oil companies have derived major benefits

  8. Operating force information on-line acquisition of a novel slave manipulator for vascular interventional surgery.

    Science.gov (United States)

    Zhao, Yan; Guo, Shuxiang; Xiao, Nan; Wang, Yuxin; Li, Youxiang; Jiang, Yuhua

    2018-04-02

    Vascular interventional surgery has its advantages compared to traditional operation. Master-slave robotic technology can further improve the operation accuracy, efficiency and safety of this complicated and high risk surgery. However, on-line acquisition of operating force information of catheter and guidewire remains to be a significant obstacle on the path to enhancing robotic surgery safety. Thus, a novel slave manipulator is proposed in this paper to realize on-line sensing of guidewire torsional operating torque and axial operation force during robotic assisted operations. A strain sensor is specially designed to detect the small scale torsional operation torque with low rotational frequency. Additionally, the axial operating force is detected via a load cell, which is incorporated into a sliding mechanism to eliminate the influence of friction. For validation, calibration and performance evaluation experiments are conducted. The results indicate that the proposed operation torque and force detection device is effective. Thus, it can provide the foundation for enabling accurate haptic feedback to the surgeon to improve surgical safety.

  9. HUBBLE SPACE TELESCOPE RESOLVES VOLCANOES ON IO

    Science.gov (United States)

    2002-01-01

    This picture is a composite of a black and white near infrared image of Jupiter and its satellite Io and a color image of Io at shorter wavelengths taken at almost the same time on March 5, 1994. These are the first images of a giant planet or its satellites taken by NASA's Hubble Space Telescope (HST) since the repair mission in December 1993. Io is too small for ground-based telescopes to see the surface details. The moon's angular diameter of one arc second is at the resolution limit of ground based telescopes. Many of these markings correspond to volcanoes that were first revealed in 1979 during the Voyager spacecraft flyby of Jupiter. Several of the volcanoes periodically are active because Io is heated by tides raised by Jupiter's powerful gravity. The volcano Pele appears as a dark spot surrounded by an irregular orange oval in the lower part of the image. The orange material has been ejected from the volcano and spread over a huge area. Though the volcano was first discovered by Voyager, the distinctive orange color of the volcanic deposits is a new discovery in these HST images. (Voyager missed it because its cameras were not sensitive to the near-infrared wavelengths where the color is apparent). The sulfur and sulfur dioxide that probably dominate Io's surface composition cannot produce this orange color, so the Pele volcano must be generating material with a more unusual composition, possibly rich in sodium. The Jupiter image, taken in near-infrared light, was obtained with HST's Wide Field and Planetary Camera in wide field mode. High altitude ammonia crystal clouds are bright in this image because they reflect infrared light before it is absorbed by methane in Jupiter's atmosphere. The most prominent feature is the Great Red Spot, which is conspicuous because of its high clouds. A cap of high-altitude haze appears at Jupiter's south pole. The Wide Field/Planetary Camera 2 was developed by the Jet Propulsion Laboratory and managed by the Goddard Spaced

  10. Understanding Strategic Information Manoeuvres in Network Media to Advance Cyber Operations: A Case Study Analysing Pro-Russian Separatists’ Cyber Information Operations in Crimean Water Crisis

    Directory of Open Access Journals (Sweden)

    Al-Khateeb Samer

    2016-06-01

    Full Text Available The inexpensive nature and wide availability of emerging media outlets, e.g. social networking sites and blogs makes them easy-to-use weapons, giving power and courage to individuals to form groups that are able to win or at least force concessions from stronger forces. Today, terrorist groups know that opinions can be influenced using networked media and this knowledge empowers and enables them to alienate their audience and sometimes provoke them into violent actions. To understand the strategic information manoeuvres used by such groups, e.g., trans-national terrorist groups, we study the channels (blogs, Twitter, etc. and methods (e.g., influential actors/groups they use to disseminate messages pertaining to recruitment, radicalization, and raising funds. We collect data from several sources, including over 130 blog websites known for pro-Russian propaganda for events such as the Crimean water crisis and Trident Juncture Exercise (TRJE 15. In addition to blogs, we collect data from Twitter for the above-mentioned events to study the crossinfluence of various social media platforms in conducting strategic information manoeuvres. The study shows that groups are able to spread their opinions and create emotional attitudes for their followers through the sophisticated and blended use of these network media platforms via powerful actors, trolls, and botnets. We design social and network science informed methodologies to study the sociotechnical behaviours of trolls and botnets and develop detection tools ready to be deployed for Cyber operations. The tools have been further tested in the information operations of ISIL, e.g., beheading of hostages in orange jump suits. This study helps identifying the actions needed to win this “battle of ideas”.

  11. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux

    OpenAIRE

    Georget , Laurent; Jaume , Mathieu; Piolle , Guillaume; Tronel , Frédéric; Viet Triem Tong , Valérie

    2017-01-01

    International audience; Information Flow Control at Operating System (OS) level features interesting properties and have been an active topic of research for years. However, no implementation can work reliably if there does not exist a way to correctly and precisely track all information flows occurring in the system. The existing implementations for Linux are based on the Linux Security Modules (LSM) framework which implements hooks at speciic points in code where any security mechanism may ...

  12. Development of Information System for Patients with Cleft Lip and Palate undergoing Operation.

    Science.gov (United States)

    Augsornwan, Darawan; Pattangtanang, Pantamanas; Surakunprapha, Palakorn

    2015-08-01

    Srinagarind Hospital has 150-200 patients with cleft lip and palate each year. When patients are admitted to hospital for surgery patients and family feel they are in a crisis of life, they feel fear anxiety and need to know about how to take care of wound, they worry if patient will feel pain, how to feed patients and many things about patients. Information is very important for patients/family to prevent complications and help their decision process, decrease parents stress and encourage better co-operation. To develop information system for patients with cleft lip-palate undergoing operation. This is an action research divided into 3 phases. Phase 1 Situation review: in this phase we interview, nursing care observation, and review nursing documents about the information giving. Phase 2 Develop information system: focus groups, for discussion about what nurses can do to develop the system to give information to patients/parents. Phase 3 evaluation: by interviewing 61 parents using the structure questionnaire. 100 percent of patients/parents received information but some items were not received. Patients/parents satisfaction was 94.9 percent, no complications. The information system development provides optimal care for patients and family with cleft lip and palate, but needs to improve some techniques or tools to give more information and evaluate further the nursing outcome after.

  13. Penerapan Action RPG pada Perangkat Mobile Berbasiskan iOS

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2011-12-01

    Full Text Available Mobile games develop along with technological developments. Gaming applications by applying special graphics technologies optimizes any mobile device. The purpose of this study is to design an Action RPG game application by applying Cocos2d technology to be implemented on mobile devices based on IOS operating system. This study performs data collecting and analyzing, interface designing, application implementation, and application evaluation using the Waterfall Model. Data collection is withdrawn from several surveys related to user needs and similar games. Progressing the study, gameplay design is performed using UML, the data storage structure, and interface design. The study results in an Action RPG game application that is implemented on mobile devices. The results showes that Action RPG games can be developed by incorporating elements of art, graphics, and stories that enhance user's interests. 

  14. Man machine interaction for operator information systems : a general purpose display package on PC/AT

    International Nuclear Information System (INIS)

    Chandra, A.K.; Dubey, B.P.; Deshpande, S.V.; Vaidya, U.W.; Khandekar, A.B.

    1991-01-01

    Several operator information systems for nuclear plants have been developed at Reactor Control Division of BARC and these have involved extensive operator interaction to extract the maximum information from the systems. Each of these systems used a different scheme for operator interaction. A composite package has now been developed on PC/AT with EGA/VGA for use with any system to obviate the necessity to develop new software for each project. This permits information to be displayed in various formats viz. trend and history curves, tabular data, bar graphs and core matrix (both for 235 and 500 MWe cores). It also allows data to be printed and plotted using multi colour plotter. This package thus integrates all the features of the earlier systems. It also integrates the operator interaction scheme. It uses window based pull down menus to select parameters to be fed into a particular display format. Within any display format the operator has significant flexibility to modify the selected parameters using context dependent soft keys. The package also allows data to be retrieved in machine readable form. This report describes the various user friendly functions implemented and also the design of the system software. (author). 1 tab., 10 fig., 3 refs

  15. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Directory of Open Access Journals (Sweden)

    Freyberger Michael

    2018-04-01

    Full Text Available An important line of privacy research is investigating the design of systems for secure input and output (I/O within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general principles that must be followed when designing a secure I/O system within Internet browsers. First, we developed a comprehensive UI attack that cannot be mitigated with popular UI defenses, and tested the efficacy of the attack through a user study administered on Amazon Mechanical Turk. Only 1 of the 59 participants who were under attack successfully noticed the UI attack, which validates the stealthiness of the attack. Second, we present multiple attack vectors against Shadow-Crypt that do not rely upon UI deception. These attack vectors expose the privacy weaknesses of Shadow DOM—the key browser primitive leveraged by ShadowCrypt. Finally, we present a sketch of potential countermeasures that can enable the design of future secure I/O systems within Internet browsers.

  16. Using accounting information systems by operations managers in a project company

    NARCIS (Netherlands)

    Wouters, Marc; van der Veeken, Henk J.M.

    2002-01-01

    This paper describes the results of a case study that investigated the use of accounting information by operations managers in a road building company. There was considerable preplanning before the execution of project activities, but task uncertainty during execution created the need to take

  17. European Co-operation in Social Science Information and Documentation: A Process of Maturation.

    Science.gov (United States)

    Rozsa, Gyorgy

    1981-01-01

    Describes an organization called the European Co-operation in Social Science Information and Documentation (ECSSID) and discusses its initiatives to establish Europe-wide cooperation in the exchange and collection of social science data. Specific aims of ECSSID are enumerated, including promotion of exchange of primary documents and building up of…

  18. Operational requirements for electronic chart display and information systems (ECDIS. Risk of overreliance on ECDIS

    Directory of Open Access Journals (Sweden)

    Adam WEINTRIT

    2008-01-01

    Full Text Available Navigating with Electronic Chart Display and Information Systems(ECDIS is fundamentally different from navigating with paper charts. The paper is addressed to model course on training in the operational use of ECDIS. It presents problems related to the risk of over reliance on ECDIS.

  19. OMNIITOX - operational life-cycle impact assessment models and information tools for practitioners

    DEFF Research Database (Denmark)

    Molander, S; Lidholm, Peter; Schowanek, Diederik

    2004-01-01

    This article is the preamble to a set of articles describing initial results from an on-going European Commission funded, 5th Framework project called OMNIITOX, Operational Models aNd Information tools for Industrial applications of eco/TOXicological impact assessments. The different parts of thi...

  20. 78 FR 70163 - Communication of Operational Information between Natural Gas Pipelines and Electric Transmission...

    Science.gov (United States)

    2013-11-22

    ..., advantages and prejudices per se.\\18\\ Rather, FPA section 205(b) and NGA section 4(b) prohibit ``undue'' preferences, advantages and prejudices.\\19\\ A difference in treatment is not unduly discriminatory when the...--real or perceived--to the sharing of non-public, operational information, the Commission proposed to...

  1. 75 FR 71464 - Metlife Technology, Operations, and Information Technology Groups Including On-Site Leased...

    Science.gov (United States)

    2010-11-23

    ... Employment and Training Administration Metlife Technology, Operations, and Information Technology Groups Including On-Site Leased Workers From Adecco, Cognizant, IBM, Infosys, Kana, Patni, Siemens, Tapfin, Veritas... Workers From At&T Solutions, Chimes, Cognizant, Patni, Siemens, Xerox Clarks Summit, PA; Notice of Revised...

  2. The Relationship between Chief Information Officer Transformational Leadership and Computing Platform Operating Systems

    Science.gov (United States)

    Anderson, George W.

    2010-01-01

    The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…

  3. A Mapping Study on Cooperation between Information System Development and Operations

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan Amrit; Daneva, Maia; Jedlitschka, Andreas; Kuvaja, Pasi; Kuhrmann, Marco; Männistö, Tomi; Münch, Jürgen; Raatikainen, Mikko

    2014-01-01

    DevOps is a conceptual framework for reintegrating development and operations of Information Systems.We performed a Systematic Mapping Study to explore DevOps. 26 articles out of 139 were selected, studied and summarized. Based on this a concept table was constructed. We discovered that DevOps has

  4. Method of Choosing the Information Technology System Supporting Management of the Military Aircraft Operation

    Directory of Open Access Journals (Sweden)

    Barszcz Piotr

    2014-12-01

    Full Text Available The paper presents a method of choosing the information technology system, the task of which is to support the management process of the military aircraft operation. The proposed method is based on surveys conducted among direct users of IT systems used in aviation of the Polish Armed Forces. The analysis of results of the surveys was conducted using statistical methods. The paper was completed with practical conclusions related to further usefulness of the individual information technology systems. In the future, they can be extremely useful in the process of selecting the best solutions and integration of the information technology systems

  5. Psychological Operations Changes that the Peruvian Army Should Implement During Counterinsurgency Operations Against the Informational Campaigns of Sendero Luminoso Political Branch Since 2000

    Science.gov (United States)

    2017-06-09

    PSYCHOLOGICAL OPERATIONS CHANGES THAT THE PERUVIAN ARMY SHOULD IMPLEMENT DURING COUNTERINSURGENCY OPERATIONS AGAINST THE INFORMATIONAL...AUG 2016 – JUN 2017 4. TITLE AND SUBTITLE Psychological Operations changes that the Peruvian Army should Implement during Counterinsurgency...branch of SL continues performing ideological and indoctrination activities in cities and towns. The research question is: what are the Psychological

  6. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  7. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  8. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  9. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  10. [Design of an anesthesia and micro-environment information management system in mobile operating room].

    Science.gov (United States)

    Wang, Xianwen; Liu, Zhiguo; Zhang, Wenchang; Wu, Qingfu; Tan, Shulin

    2013-08-01

    We have designed a mobile operating room information management system. The system is composed of a client and a server. A client, consisting of a PC, medical equipments, PLC and sensors, provides the acquisition and processing of anesthesia and micro-environment data. A server is a powerful computer that stores the data of the system. The client gathers the medical device data by using the C/S mode, and analyzes the obtained HL7 messages through the class library call. The client collects the micro-environment information with PLC, and finishes the data reading with the OPC technology. Experiment results showed that the designed system could manage the patient anesthesia and micro-environment information well, and improve the efficiency of the doctors' works and the digital level of the mobile operating room.

  11. Antiviral Information Management System (AIMS): a prototype for operational innovation in drug development.

    Science.gov (United States)

    Jadhav, Pravin R; Neal, Lauren; Florian, Jeff; Chen, Ying; Naeger, Lisa; Robertson, Sarah; Soon, Guoxing; Birnkrant, Debra

    2010-09-01

    This article presents a prototype for an operational innovation in knowledge management (KM). These operational innovations are geared toward managing knowledge efficiently and accessing all available information by embracing advances in bioinformatics and allied fields. The specific components of the proposed KM system are (1) a database to archive hepatitis C virus (HCV) treatment data in a structured format and retrieve information in a query-capable manner and (2) an automated analysis tool to inform trial design elements for HCV drug development. The proposed framework is intended to benefit drug development by increasing efficiency of dose selection and improving the consistency of advice from US Food and Drug Administration (FDA). It is also hoped that the framework will encourage collaboration among FDA, industry, and academic scientists to guide the HCV drug development process using model-based quantitative analysis techniques.

  12. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  13. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  14. X-ray probes of Jupiter's auroral zones, Galilean moons, and the Io plasma torus

    Science.gov (United States)

    Elsner, R. F.; Ramsey, B. D.; Swartz, D. A.; Gaskin, J. A.; Rehak, P.; Waite, J. H., Jr.; Cooper, J. F.; Johnson, R. E.

    2005-09-01

    Remote observations from the Earth orbiting Chandra X-ray Observatory and the XMM-Newton Observatory have shown the the Jovian system is a rich and complex source of x-ray emission. The planet's auroral zones and its disk are powerful sources of x-ray emission, though with different origins. Chandra observations discovered x-ray emission from the Io plasma torus and from the Galilean moons Io, Europa, and possibly Ganymede. The emission from the moons is due to bombardment of their surfaces by highly energetic magnetospheric protons, and oxygen and sulfur ions, producing fluorescent x-ray emission lines from the elements in their surfaces against an intense background continuum. Although very faint when observed from Earth orbit, an imaging x-ray spectrometer in orbit around the icy Galilean moons would provide a detail mapping of the elemental composition in their surfaces. Here we examine the necessary characteristics of such an instrument and the challenges it would face in the extreme radiation environment in which it would have to survive and operate. Such an instrument would have the ultimate goal of providing detailed high-resolution maps of the elemental abundances of the surfaces of Jupiter's icy moons and Io, as well as detailed study of the x-ray mission from the Io plasma torus, Jupiter's auroral zones, and the planetary disk.

  15. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  16. A comprehensive operating room information system using the Kinect sensors and RFID.

    Science.gov (United States)

    Nouei, Mahyar Taghizadeh; Kamyad, Ali Vahidian; Soroush, Ahmad Reza; Ghazalbash, Somayeh

    2015-04-01

    Occasionally, surgeons do need various types of information to be available rapidly, efficiently and safely during surgical procedures. Meanwhile, they need to free up hands throughout the surgery to necessarily access the mouse to control any application in the sterility mode. In addition, they are required to record audio as well as video files, and enter and save some data. This is an attempt to develop a comprehensive operating room information system called "Medinav" to tackle all mentioned issues. An integrated and comprehensive operating room information system is introduced to be compatible with Health Level 7 (HL7) and digital imaging and communications in medicine (DICOM). DICOM is a standard for handling, storing, printing, and transmitting information in medical imaging. Besides, a natural user interface (NUI) is designed specifically for operating rooms where touch-less interactions with finger and hand tracking are in use. Further, the system could both record procedural data automatically, and view acquired information from multiple perspectives graphically. A prototype system is tested in a live operating room environment at an Iranian teaching hospital. There are also contextual interviews and usability satisfaction questionnaires conducted with the "MediNav" system to investigate how useful the proposed system could be. The results reveal that integration of these systems into a complete solution is the key to not only stream up data and workflow but maximize surgical team usefulness as well. It is now possible to comprehensively collect and visualize medical information, and access a management tool with a touch-less NUI in a rather quick, practical, and harmless manner.

  17. Improving Water Resources System Operation by Direct Use of Hydroclimatic Information

    Science.gov (United States)

    Castelletti, A.; Pianosi, F.

    2011-12-01

    It is generally agreed that more information translates into better decisions. For instance, the availability of inflow predictions can improve reservoir operation; soil moisture data can be exploited to increase irrigation efficiency; etc. However, beyond this general statement, many theoretical and practical questions remain open. Provided that not all information sources are equally relevant, how does their value depend on the physical features of the water system and on the purposes of the system operation? What is the minimum lead time needed for anticipatory management to be effective? How does uncertainty in the information propagates through the modelling chain from hydroclimatic data through descriptive and decision models, and finally affect the decision? Is the data-predictions-decision paradigm truly effective or would it be better to directly use hydroclimatic data to take optimal decisions, skipping the intermediate step of hydrological forecasting? In this work we investigate these issues by application to the management of a complex water system in Northern Vietnam, characterized by multiple, conflicting objectives including hydropower production, flood control and water supply. First, we quantify the value of hydroclimatic information as the improvement in the system performances that could be attained under the (ideal) assumption of perfect knowledge of all future meteorological and hydrological input. Then, we assess and compare the relevance of different candidate information (meteorological or hydrological observations; ground or remote data; etc.) for the purpose of system operation by novel Input Variable Selection techniques. Finally, we evaluate the performance improvement made possible by the use of such information in re-designing the system operation.

  18. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  19. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  20. Io as a source of the jovian dust streams

    Science.gov (United States)

    Graps; Grun; Svedhem; Kruger; Horanyl; Heck; Lammers

    2000-05-04

    Streams of dust emerging from the direction of Jupiter were discovered in 1992 during the flyby of the Ulysses spacecraft, but their precise origin within the jovian system remained unclear. Further data collected by the Galileo spacecraft, which has been orbiting Jupiter since December 1995, identified the possible sources of dust as Jupiter's main ring, its gossamer ring, comet Shoemaker-Levy 9 (ref. 8) and Io. All but Jupiter's gossamer ring and Io have since been ruled out. Here we find that the dominant source of the jovian dust streams is Io, on the basis of periodicities in the dust impact signal. Io's volcanoes, rather than impact ejecta, are the dust sources.

  1. IoT interoperability:a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  2. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  3. Global color and albedo variations on Io

    Science.gov (United States)

    McEwen, A.S.

    1988-01-01

    Three multispectral mosaics of Io have been produced from Voyager imaging data: a global mosaic from each of the Voyager 1 and Voyager 2 data sets and a high-resolution mosaic of the region surrounding the volcano Ra Patera. The mosaics are maps of normal albedo and color in accurate geometric map formats. Io's photometric behavior, mapped with a two-image technique, is spatially variable, especially in the bright white areas. The disk-integrated color and albedo of the satellite have been remarkably constant over recent decades, despite the volcanic activity and the many differences between Voyager 1 and 2 images (acquired just 4 months apart). This constancy is most likely due to the consistent occurrence of large Pele-type plumes with relatively dark, red deposits in the region from long 240 to 360??. A transient brightening southeast of Pele during the Voyager 1 encounter was probably due to real changes in surface and/or atmospheric materials, rather than to photometric behavior. The intrinsic spectral variability of Io, as seen in a series of two-dimensional histograms of the multispectral mosaics, consists of continuous variation among three major spectral end members. The data were mapped into five spectral units to compare them with laboratory measurements of candidate surface materials and to show the planimetric distributions. Unit 1 is best fit by the spectral reflectance of ordinary elemental sulfur, and it is closely associated with the Peletype plume deposits. Unit 2 is strongly confined to the polar caps above about latitude ??50??, but its composition is unknown. Unit 5 is probably SO2 with relatively minor contamination; it is concentrated in the equatorial region and near the long-lived Prometheus-type plumes. Units 3 and 4 are gradational between units 1 and 5. In addition to SO2 and elemental sulfur, other plausible components of the surface are polysulfur oxides, FeCl2, Na2S, and NaHS. ?? 1988.

  4. Neutral hydrogen in elliptical and IO galaxies

    International Nuclear Information System (INIS)

    Bottinelli, L.; Gouguenheim, L.

    1979-01-01

    New HI detections have been obtained using the Nancay radiotelescope for NGC 2974 and 3962. These results and the large scale distribution obtained for NGC 3962 indicate that the HI-rich elliptical galaxies exhibit common properties which are not easily explained by accretion of an intergalactic cloud. The field aroud NGC 1052 has been mapped and there is an HI connection with the neighbouring galaxies. The HI content of several IO galaxies indicates that the galaxies which are members of groups are relatively HI-rich; this could be produced by additional HI coming from companion galaxies [fr

  5. Improving CANDU plant operation and maintenance through retrofit information technology systems

    International Nuclear Information System (INIS)

    Lupton, L.R.; Judd, R.A.; MacBeth, M.J.

    1998-01-01

    CANDU plant owners are facing an increasingly competitive environment for the generation of electricity. To meet this challenge, all owners have identified that information technology offers opportunities for significant improvements in CANDU operation, maintenance and administration (OM and A) costs. Targeted information technology application areas include instrumentation and control, engineering, construction, operations and plant information management. These opportunities also pose challenges and issues that must be addressed if the full benefits of the advances in information technology are to be achieved. Key among these are system hardware and software maintenance, and obsolescence protection; AECL has been supporting CANDU stations with the initial development and evaluation of systems to improve plant performance and cost. Key initiatives that have been implemented or are in the process of being implemented in some CANDU plants to achieve operational benefits include: critical safety parameter monitor system; advanced computerized annunciation system; plant historical data system; and plant display system. Each system will be described in terms of its role in enhancing current CANDU plant performance and how they will contribute to future CANDU plant performance

  6. Use of Modern Information Technologies to Improve Energy Efficiency of Thermal Power Plant Operation

    Science.gov (United States)

    Arakelyan, E. K.; Andryushin, A. V.; Sabanin, V. R.; Mezin, S. V.; Pashchenko, F. F.

    2017-11-01

    The report shows the need for the development and implementation of new approaches to operational management of the modes and the efficiency of the equipment of thermal power plants on the basis of modern information technologies to significantly improve the economy of operation of thermal power plants by complex solution of the tasks of block and station levels. The proposed approach is the adjustment of measured parameters, ensuring the accuracy of all the main parameters required for material, heat and energy balances for each unit and the station in general.

  7. Risk informed evaluation of allowed outage times considering several modes of plant operation

    International Nuclear Information System (INIS)

    Cepin, M.; Martorell, S.; Villanueva, J. F.; Carlos, S.; Sanchez, A.I.

    2001-01-01

    The methods for assessment of risk have been increasingly used in a decision-making. The objective of this paper is to extend the method for risk informed evaluation of allowed outage times (AOTs), which considers the plant power operation. Such extension allows consideration of several modes of plant operation or plant configurations. Two methods were developed. Results show that better methods and more data included into the models may reduce the conservatism in the evaluations and may contribute to increased flexibility about decisions on AOT.(author)

  8. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  9. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  10. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  11. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  12. Efficacy of the EZ-IO needle driver for out-of-hospital intraosseous access--a preliminary, observational, multicenter study.

    Science.gov (United States)

    Schalk, Richard; Schweigkofler, Uwe; Lotz, Gösta; Zacharowski, Kai; Latasch, Leo; Byhahn, Christian

    2011-10-26

    Intraosseous (IO) access represents a reliable alternative to intravenous vascular access and is explicitly recommended in the current guidelines of the European Resuscitation Council when intravenous access is difficult or impossible. We therefore aimed to study the efficacy of the intraosseous needle driver EZ-IO in the prehospital setting. During a 24-month period, all cases of prehospital IO access using the EZ-IO needle driver within three operational areas of emergency medical services were prospectively recorded by a standardized questionnaire that needed to be filled out by the rescuer immediately after the mission and sent to the primary investigator. We determined the rate of successful insertion of the IO needle, the time required, immediate procedure-related complications, the level of previous experience with IO access, and operator's subjective satisfaction with the device. 77 IO needle insertions were performed in 69 adults and five infants and children by emergency physicians (n = 72 applications) and paramedics (n = 5 applications). Needle placement was successful at the first attempt in all but 2 adults (one patient with unrecognized total knee arthroplasty, one case of needle obstruction after placement). The majority of users (92%) were relative novices with less than five previous IO needle placements. Of 22 responsive patients, 18 reported pain upon fluid administration via the needle. The rescuers' subjective rating regarding handling of the device and ease of needle insertion, as described by means of an analogue scale (0 = entirely unsatisfied, 10 = most satisfied), provided a median score of 10 (range 1-10). The EZ-IO needle driver was an efficient alternative to establish immediate out-of-hospital vascular access. However, significant pain upon intramedullary infusion was observed in the majority of responsive patients.

  13. Knowledge Portal Support to the Naval Postgraduate School's Advanced Distributed Learning Program for the Information Systems and Operations Curriculum

    National Research Council Canada - National Science Library

    Walker, Allisa

    2000-01-01

    .... The goal of this research is to show how developing a knowledge portal for use with the Information Systems and Operations curriculum knowledge base could expand the use of tacit and explicit knowledge by the operators...

  14. Thermal models for basaltic volcanism on Io

    Science.gov (United States)

    Keszthelyil, L.; McEwen, A.

    1997-01-01

    We present a new model for the thermal emissions from active basaltic eruptions on Io. While our methodology shares many similarities with previous work, it is significantly different in that (1) it uses a field tested cooling model and (2) the model is more applicable to pahoehoe flows and lava lakes than fountain-fed, channelized, 'a'a flows. This model demonstrates the large effect lava porosity has on the surface cooling rate (with denser flows cooling more slowly) and provides a preliminary tool for examining some of the hot spots on Io. The model infrared signature of a basaltic eruption is largely controlled by a single parameter, ??, the average survival time for a lava surface. During an active eruption surfaces are quickly covered or otherwise destroyed and typical values of ?? for a basaltic eruption are expected to be on the order of 10 seconds to 10 minutes. Our model suggests that the Galileo SSI eclipse data are consistent with moderately active to quiescent basaltic lava lakes but are not diagnostic of such activity. Copyright 1997 by the American Geophysical Union.

  15. Volcanic Activity at Tvashtar Catena, Io

    Science.gov (United States)

    Milazzo, M. P.; Keszthelyi, L. P.; Radebaugh, J.; Davies, A. G.; McEwen, A. S.

    2004-01-01

    Tvashtar Catena (63 N, 120 W) is one of the most interesting features on Io. This chain of large paterae (caldera-like depressions) has exhibited highly variable volcanic activity in a series of observations. Tvashtar is the type example of a style of volcanism seen only at high latitudes, with short-lived Pele-type plumes and short-lived by intense thermal events. Evidence for a hot spot at Tvashtar was first detected in an eclipse observation in April 1997 (orbit G7) by the Solid State Imager (SSI) on the Galileo Spacecraft. Tvashtar was originally targeted for observation at higher resolution in the close flyby in November 1999 (I25) because of its interesting large-scale topography. There are relatively few but generally larger paterae at high latitudes on Io. I25 images revealed a 25 km long, 1-2 km high lava curtain via a pattern of saturation and bleeding in the CCD image, which requires very high temperatures.

  16. On providing the fault-tolerant operation of information systems based on open content management systems

    Science.gov (United States)

    Kratov, Sergey

    2018-01-01

    Modern information systems designed to service a wide range of users, regardless of their subject area, are increasingly based on Web technologies and are available to users via Internet. The article discusses the issues of providing the fault-tolerant operation of such information systems, based on free and open source content management systems. The toolkit available to administrators of similar systems is shown; the scenarios for using these tools are described. Options for organizing backups and restoring the operability of systems after failures are suggested. Application of the proposed methods and approaches allows providing continuous monitoring of the state of systems, timely response to the emergence of possible problems and their prompt solution.

  17. On the Value of Structural Health Monitoring Information for the Operation of Wind Parks

    DEFF Research Database (Denmark)

    Thöns, Sebastian; Faber, Michael H.; Val, Dimitri V.

    2017-01-01

    facilitates a benefit and risk informed assessment and optimization of SHM strategies and encompasses models for the infrastructure functionality, the structural constituent and system risks and its management as well as the performance of SHM strategies. A wind park system model incorporating the structural......In the present paper, an approach for the quantification of the Value of Structural Health Monitoring (SHM) Information building upon a framework for infrastructure system utility and decision analysis is developed and applied to the operation of wind parks. The quantification of the value of SHM...... wind turbine systems and its components is developed accounting for the wind park functionality, i.e. power production, its operation and its cascading damage and failure scenarios. This system model facilitates to quantify the expected benefits and risks throughout the service life accounting...

  18. Secure communication interface design for IoT applications, using the GSM network

    OpenAIRE

    Wightwick, Andrew; Halak, Basel

    2016-01-01

    In this work, a secure short messaging service (SMS)-based communication interface is designed. The interface has applications in the internet of things (IoT) such as machine to machine (M2M) communications, and human-operated remote system management. The case study of waking a personal computer remotely is considered, and a complete proof-of-conceptis implemented for this purpose, using a field-programmable gate array (FPGA)-based receiving device and an Androidbased transmitting device. On...

  19. A Carrier Class IoT Service Architecture Integrating IMS with SWE

    OpenAIRE

    Xie, Dongliang; Shang, Chao; Chen, Jinchao; Lai, Yongfang; Pang, Chuanxiao

    2014-01-01

    Integrating the sensing capabilities of wireless sensor network (WSN) into the traditional telecom network is an important stage to realize future ubiquitous intelligence in the Internet of Things. Driven by the vision of service oriented architecture (SOA), this paper proposed a carrier class Internet of Things (IoT) service architecture named as MUSE. MUSE integrates WSN with IMS OSE framework to enable the WSN services to be operable and manageable. Also sensor web enablement (SWE) framewo...

  20. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  1. Simplified reactive power management strategy for complex power grids under stochastic operation and incomplete information

    DEFF Research Database (Denmark)

    Vlachogiannis, Ioannis (John)

    2009-01-01

    grids is a major issue for system operators. Under these circumstances an online reactive power management strategy with minimum risk concerning all uncertain and stochastic parameters is proposed. Therefore, new concepts such as reactive power-weighted node-to-node linking and reactive power control......In the current released energy market, the large-scale complex transmission networks and the distribution ones with dispersed energy sources and "intelligent" components operate under uncertainties, stochastic and prior incomplete information. A safe and reliable operation of such complex power...... capability are introduced. A distributed and interconnected stochastic learning automata system is implemented to manage, in a unified and unique way, the reactive power in complex power grids with stochastic reactive power demand and detect the vulnerable part. The proposed simplified strategy can also...

  2. System and operations concept for the Geostationary Earth Observatory data and information system

    International Nuclear Information System (INIS)

    Weinstein, F.C.; Messing, F.; Armstead, A.

    1992-03-01

    The Geostationary Earth Observatory (GEO) Data and Information System (GEODIS) is a critical element in achieving GEO program goals. GEODIS must collect, process, and disseminate scientific data to meet the challenges of NASA's Mission to Planet Earth. The system and operations concept for GEODIS described here summarizes its principal functional elements and external interfaces. GEODIS operations include mission support (of the GEO platform and instruments), data production (of multiple levels of products derived from GEO sensor data), user support (in accessing this data both from archives and directly via satellite rebroadcast links), and institutional support (for communications, management, development, and testing). This concept is part of a baseline generated for Marshall Space Flight Center to define the preliminary architecture of GEODIS. After validation by scientists, managers, operators, and developers, these concepts may be used to guide future work in defining detailed requirements and designs for GEODIS. 6 refs

  3. Lemon: An MPI parallel I/O library for data encapsulation using LIME

    Science.gov (United States)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten; ETM Collaboration

    2012-06-01

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the Lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message Encapsulation format. This format allows for storing large blocks of binary data and corresponding metadata in the same file. Even if designed for LQCD needs, this format might be useful for any application with this type of data profile. The design, implementation and application of Lemon are described. We conclude with presenting the excellent scaling properties of Lemon on state-of-the-art high performance computers. Program summaryProgram title: Lemon Catalogue identifier: AELP_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AELP_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License version 3 No. of lines in distributed program, including test data, etc.: 32 860 No. of bytes in distributed program, including test data, etc.: 223 762 Distribution format: tar.gz Programming language: MPI and C Computer: Any which supports MPI I/O Operating system: Any Has the code been vectorised or parallelised?: Yes. Includes MPI directives. RAM: Depending on input used Classification: 11.5 External routines: MPI Nature of problem: Distributed file I/O with metadata Solution method: MPI parallel I/O based implementation of LIME format Running time: Varies depending on file and architecture size, in the order of seconds

  4. Natural Resource Information System. Volume 2: System operating procedures and instructions

    Science.gov (United States)

    1972-01-01

    A total computer software system description is provided for the prototype Natural Resource Information System designed to store, process, and display data of maximum usefulness to land management decision making. Program modules are described, as are the computer file design, file updating methods, digitizing process, and paper tape conversion to magnetic tape. Operating instructions for the system, data output, printed output, and graphic output are also discussed.

  5. Value Informed Conception, Design, Implementation and Operation of Education and Teaching Activities

    DEFF Research Database (Denmark)

    Nielsen, Michael Havbro Faber; Nielsen, Linda

    2017-01-01

    In the present paper we take basis in the basic postulate that the objective of education and teaching is value creation. With this setout we take up two implications, namely: i) decision analysis is the logical choice of management framework for conceiving, designing, implementing and operating...... (CDIO) education and teaching activities and ii) a thorough, transparent and continuously informed discourse is necessary among all stakeholders to education on what this “value” actually is....

  6. Reducing the operational energy demand in buildings using building information modeling tools and sustainability approaches

    OpenAIRE

    Shoubi, Mojtaba Valinejad; Shoubi, Masoud Valinejad; Bagchi, Ashutosh; Barough, Azin Shakiba

    2015-01-01

    A sustainable building is constructed of materials that could decrease environmental impacts, such as energy usage, during the lifecycle of the building. Building Information Modeling (BIM) has been identified as an effective tool for building performance analysis virtually in the design stage. The main aims of this study were to assess various combinations of materials using BIM and identify alternative, sustainable solutions to reduce operational energy consumption. The amount of energy con...

  7. Use of Information Communication Technology (ICT) and Library Operation: An Overview

    OpenAIRE

    Bhoi, Narendra Kumar

    2017-01-01

    This paper discusses the different dimension of the ICTs. It gives an awareness of technology in library and why there is a need to understand the use of ICT in the library for rendering enhanced library services and information to users. The current study highlights the areas where ICT can be applied. Basically, the paper explains different technologies and their use in the library operation. How library services are prompted with the use of technology like RemoteXs, RFID Technology, QR Code...

  8. Framework for Analyzing Android I/O Stack Behavior: From Generating theWorkload to Analyzing the Trace

    Directory of Open Access Journals (Sweden)

    Sooman Jeong

    2013-12-01

    Full Text Available Abstract: The existing I/O workload generators and trace capturing tools are not adaptable to generating nor capturing the I/O requests of Android apps. The Android platform needs proper tools to capture and replay real world workload in the Android platform to verify the result of benchmark tools. This paper introduces Android Storage Performance Analysis Tool, AndroStep, which is specifically designed for characterizing and analyzing the behavior of the I/O subsystem in Android based devices. The AndroStep consists of Mobibench (workload generator, MOST (Mobile Storage Analyzer, and Mobigen (workload replayer. Mobibench is an Android app that generates a filesystem as well as SQLite database operations. Mobibench can also vary the number of concurrent threads to examining the filesystem scalability to support concurrency, e.g., metadata updates, journal file creation/deletion. MOST captures the trace and extracts key filesystem access characteristics such as access pattern with respect to file types, ratio between random vs. sequential access, ratio between buffered vs. synchronous I/O, fraction of metadata accesses, etc. MOST implements reverse mapping feature (finding an inode for a given block and retrospective reverse mapping (finding an inode for a deleted file. Mobigen is a trace capturing and replaying tool that is specifically designed to perform the user experiment without actual human intervention. Mobigen records the system calls generated from the user behavior and sanitizes the trace for replayable form. Mobigen can replay this trace on different Android platforms or with different I/O stack configurations. As an example of using AndroStep, we analyzed the performances of twelve Android smartphones and the SQLite performances on five different filesystems. AndroStep makes otherwise time consuming I/O stack analysis extremely versatile. AndroStep makes a significant contribution in terms of shedding light on internal behavior of

  9. Juno-UVS observation of the Io footprint: Influence of Io's local environment and passage into eclipse on the strength of the interaction

    Science.gov (United States)

    Hue, V.; Gladstone, R.; Greathouse, T. K.; Versteeg, M.; Bonfond, B.; Saur, J.; Davis, M. W.; Roth, L.; Grodent, D. C.; Gerard, J. C. M. C.; Kammer, J.; Bolton, S. J.; Levin, S.; Connerney, J. E. P.

    2017-12-01

    The Juno mission offers an unprecedented opportunity to study Jupiter, from its internal structure to its magnetospheric environment. Juno-UVS is a UV spectrograph with a bandpass of 70Io footprint and extended tail as Io enters into eclipse. This observation may better constrain whether the atmosphere of Io is sustained via volcanic activity or sublimation. Among other processes, the modulation of Io's footprint brightness correlates to the strength of the interaction between the Io plasma torus and its ionosphere, which, in turn, is likely to be affected by the atmospheric collapse. UVS observed the Io footprint during two eclipses that occurred on PJ1 and PJ3, and one additional eclipse observation is planned during PJ9 (24 Oct. 2017). We present how the electrodynamic coupling between Io and Jupiter is influenced by changes in Io's local environment, e.g. Io's passage in and out of eclipse and Io's traverse of the magnetodisc plasma sheet.

  10. The Effects of Hurricane Katrina on the Defense Information Systems Agency Continuity of Operations and Test Facility

    National Research Council Canada - National Science Library

    Jolliffe, Richard B; Burton, Bruce A; Wicecarver, Jacqueline L; Kince-Carnpbell, Therese M; Lesly, Kelly B; Ryan, Susan P; Pinnock, Richard A; Bachle, Susan H; Calderon, Pedro J; Voshell, Adrianne R; Johnson, Meredith H

    2006-01-01

    .... The Defense Information Systems Agency Continuity of Operations and Test Facility (DCTF), located in Slidell, Louisiana, experienced communications disruptions as a result of Hurricane Katrina...

  11. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  12. Beginning iOS 3D unreal games development

    CERN Document Server

    Chin, Robert

    2012-01-01

    Aims to be first book on the market concerning iOS 3D game apps development using the Unreal UDK Unreal UDK and scripting engine are popular emerging tools used for building games like those you see from Epic iOS and mobile game apps development are popular tech and book markets

  13. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  14. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  15. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  16. The role of SO2 in volcanism on Io

    Science.gov (United States)

    Smith, B.A.; Shoemaker, E.M.; Kieffer, S.W.; Cook, A.F.

    1979-01-01

    Io and Earth are the only planetary bodies known to be volcanically active; the energetics of the eruptive plumes on Io have important structural implications and are closely linked with the presence of sulphur and SO 2. ?? 1979 Nature Publishing Group.

  17. Which IO model best simulates the real thing?

    Science.gov (United States)

    Ota, Floyd S; Yee, Linton L; Garcia, Francisco J; Grisham, Jonathan E; Yamamoto, Loren G

    2003-12-01

    To determine which model best simulates the actual IO procedure in children. Forty emergency and critical care physicians with significant IO experience (6 or more IO procedures) in real children were recruited at 4 academic centers. Study subjects were provided with a kit containing 15 gauge IO needles and 5 IO models; a plastic IO doll leg (PL), a turkey femur/thigh (TT), a turkey tibia/drumstick (TD), a chicken femur/thigh (CT), and a pork rib (PR). Study participants scored the similarity of the bone model to that of placing an IO in a child (0 = no experience, 1 = perfect simulation, 2 = excellent, but not perfect, 3 = good, 4 = moderate, 5 = poor) and the hardness of the bone (H = too hard, J = just right, S = too soft) for each age group (preterm, newborn, 1-4 months, 5-12 months, 12-36 months, 3-6 years, 6-12 years, and >12 years old) of whom they had previous experience. Mean scores were calculated and compared to determine which model provided the best simulation. After excluding zero scores, overall mean scores for the CT, TD, TT, PL, and PR models were 3.2, 3.3, 3.3, 3.3, and 4.4 (P IO research and teaching purposes, bone models should be age appropriate. This study suggests that there is great variability in preference with the chicken, turkey, and plastic models.

  18. Volcanic origin of the eruptive plumes on Io

    Science.gov (United States)

    Cook, A.F.; Shoemaker, E.M.; Smith, B.A.; Danielson, G.E.; Johnson, T.V.; Synnott, S.P.

    1981-01-01

    A quadruple long exposure of Io in eclipse exhibits faint auroral emission from the eruptive plumes. No luminous spots in the vents, predicted by Gold, were observed. Heat from the interior of Io appears to be the predominant source of energy in the plumes. Copyright ?? 1981 AAAS.

  19. Information transfer in multidisciplinary operating room teams: a simulation-based observational study.

    Science.gov (United States)

    Cumin, David; Skilton, Carmen; Weller, Jennifer

    2017-03-01

    Communication of clinically relevant information between members of the operating room (OR) team is critical for safe patient care. Formal communication processes, such as briefing, sign in and time out, are designed to promote this. We investigated patterns of communication of clinically relevant information between OR staff in simulated surgical scenarios, to identify factors associated with effective information sharing. We focused on the influence of precase briefing, sign in and time out, which we defined as formal team communications. Twenty teams of six participated in two scenarios during a day-long course. Participants each received unique, clinically relevant items of information (information probes) prior to simulations and were tested postscenario on recall of the information in the probe. Using videos of the simulations, we coded each time an information probe was mentioned against a structured framework. Of the 145 instances where a probe was mentioned at least once, 75 (51.7%) were mentioned during a formal team communication. However, there were 89 instances of a possible 234 (38%) where a probe was never mentioned. Some team members were more likely to mention the information than others. When probes were mentioned during formal team communications, significantly more team members were attentive (1.4 vs 2.3; ptime out in the Surgical Safety Checklist, our findings suggest suboptimal transmission of information between team members and unequal contributions of information by different professional groups. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  20. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  1. Information delivery in team communication of MCR operators for an emergency task

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kwang Sub; Park, Jin Kyun; Jung, Won Dae

    2005-01-01

    Team performance is a major measure to evaluate the ability of team when a lot of people perform a task of common purpose such as the main control room operators in the nuclear power plant. A team performance is affected the collaboration and communication among operators under dynamic situation as well as by the cognitive process of each team member. Specially, under the emergency situation, more clear and apparent communication in a team is a critical key for the appropriate response to emergency situation. As a general human factor analysis accesses the operator's behavior, it leads to a resulting action of planning, decision, problem-solving. In order to access the internal information and background information of his/her behavior, the verbal protocol analysis is applied. The impact factors on the team performance are derived from the state of the art for team performance, and it is found that the communication is a common key for all impact factors. And, in turn, the impact factors for the communication are accesses and the more detailed analysis is performed. The recorded data for the operator training for emergency situation of nuclear power plant training center are analyzed according to the verbal protocol analysis that are being generally utilized in cognitive psychology, educational psychology, and cognitive science. Two aspects, external (syntax) and internal (symantic) aspects of communication are reviewed. From the syntax analysis, it is found that the task of each step in EOP is separated according to each corresponding operator and the ordinary training is important, and the weak-points for a sentence presentation can be found team-by-team. And, from the symantic analysis for the diagnostic procedure of EOP is performed and the communication errors due to different situation awareness by operators could be found, and it lead to a diagnosis failure. The factors for different symantic cognition for a situation are analyzed and the affecting

  2. Information delivery in team communication of MCR operators for an emergency task

    International Nuclear Information System (INIS)

    Jeong, Kwang Sub; Park, Jin Kyun; Jung, Won Dae

    2005-01-01

    Team performance is a major measure to evaluate the ability of team when a lot of people perform a task of common purpose such as the main control room operators in the nuclear power plant. A team performance is affected the collaboration and communication among operators under dynamic situation as well as by the cognitive process of each team member. Specially, under the emergency situation, more clear and apparent communication in a team is a critical key for the appropriate response to emergency situation. As a general human factor analysis accesses the operator's behavior, it leads to a resulting action of planning, decision, problem-solving. In order to access the internal information and background information of his/her behavior, the verbal protocol analysis is applied. The impact factors on the team performance are derived from the state of the art for team performance, and it is found that the communication is a common key for all impact factors. And, in turn, the impact factors for the communication are accesses and the more detailed analysis is performed. The recorded data for the operator training for emergency situation of nuclear power plant training center are analyzed according to the verbal protocol analysis that are being generally utilized in cognitive psychology, educational psychology, and cognitive science. Two aspects, external (syntax) and internal (symantic) aspects of communication are reviewed. From the syntax analysis, it is found that the task of each step in EOP is separated according to each corresponding operator and the ordinary training is important, and the weak-points for a sentence presentation can be found team-by-team. And, from the symantic analysis for the diagnostic procedure of EOP is performed and the communication errors due to different situation awareness by operators could be found, and it lead to a diagnosis failure. The factors for different symantic cognition for a situation are analyzed and the affecting factors

  3. Contributions to risk informed decision-making. Operational risk analysis in the oil and gas industry

    Energy Technology Data Exchange (ETDEWEB)

    Roeed, Willy

    2006-08-15

    This thesis addresses the use of risk analyses to support decision-making, to find the balance between different concerns, such as for example safety of personnel and operational costs, i.e. economic values. The focus is on the offshore oil and gas industry, but many of the discussions and conclusions are general and could also be applied to other industries. The thesis applies an understanding of risk being the combination of the two basic dimensions (a) possible consequences (outcomes) and (b) associated uncertainties. This risk concept is general, and risk analyses can be used to provide decision-making support to all kinds of decision problems. However, our main focus is on risk analyses in the operational phase, so-called operational risk analyses, and in particular evaluation of safety barrier performance, for the protection of personnel, environment and assets. Hence, the main focus in this thesis is upon risks in terms of hazardous events. The challenges in the operational phase differ from the planning phase, and many risk analyses carried out today do not reflect installation-specific information obtained in the operational phase to the extent that is wanted. There is a need for more suitable risk analysis tools, and the thesis gives some contributions to development of such tools

  4. Powered intraosseous device (EZ-IO) for critically ill patients.

    Science.gov (United States)

    Oksan, Derinoz; Ayfer, Keles

    2013-07-01

    We reviewed the charts of 25 patients who underwent powered intraosseous line insertion between July 1, 2008 and August 31, 2010 to determine its users, indications, procedural details, success rates, and complications. Intraosseous (IO) line was inserted in the anteromedial aspect of the proximal tibia in all patients. The first attempt was successful in 80%, and the median duration for insertion of the IO line was 4 hours. Extravasation was the most common complication. Ninety-six percent of the physicians had undergone prior training in IO insertion. Because of its high success and short procedure time, IO access should be the first alternative to failed vascular access in critically ill children. Training in IO should be extended to all who care for pediatric patients in inpatient as well as in prehospital and emergency department settings.

  5. Improving CANDU plant operation and maintenance through retrofit information technology systems

    International Nuclear Information System (INIS)

    Lupton, L. R.; Judd, R. A.

    1998-01-01

    CANDU plant owners are facing an increasingly competitive environment for the generation of electricity. To meet this challenge, all owners have identified that information technology offers opportunities for significant improvements in CANDU operation, maintenance and administration (OM and A) costs. Targeted information technology application areas include instrumentation and control, engineering, construction, operations and plant information management. These opportunities also pose challenges and issues that must be addressed if the full benefits of the advances in information technology are to be achieved. Key among these are system hardware and software maintenance, and obsolescence protection. AECL has been supporting CANDU stations with the initial development and evaluation of systems to improve plant performance and cost. Five key initiatives that have been implemented or are in the process of being implemented in some CANDU plants to achieve cooperational benefits include: critical safety parameter monitor system; advanced computerized annunciation system; plant historical data system; plant display system; and digital protection system. Each system will be described in terms of its role in enhancing current CANDU plant performance and how they will contribute to future CANDU plant performance. (author). 8 refs., 3 figs

  6. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  7. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  8. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  9. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    , sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile......In today’s research on creating a more sustainable energy utilisation in society, much effort is directed towards producing or consuming energy. This focus tends to overlook the fact that energy needs to be sold and distributed to the consumers in increasingly open marketplaces where the marketing...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market...

  10. RFID-based information visibility for hospital operations: exploring its positive effects using discrete event simulation.

    Science.gov (United States)

    Asamoah, Daniel A; Sharda, Ramesh; Rude, Howard N; Doran, Derek

    2016-10-12

    Long queues and wait times often occur at hospitals and affect smooth delivery of health services. To improve hospital operations, prior studies have developed scheduling techniques to minimize patient wait times. However, these studies lack in demonstrating how such techniques respond to real-time information needs of hospitals and efficiently manage wait times. This article presents a multi-method study on the positive impact of providing real-time scheduling information to patients using the RFID technology. Using a simulation methodology, we present a generic scenario, which can be mapped to real-life situations, where patients can select the order of laboratory services. The study shows that information visibility offered by RFID technology results in decreased wait times and improves resource utilization. We also discuss the applicability of the results based on field interviews granted by hospital clinicians and administrators on the perceived barriers and benefits of an RFID system.

  11. Impact of digital information and control system platform selection on nuclear power generating plant operating costs

    International Nuclear Information System (INIS)

    Bogard, T.; Radomski, S.; Sterdis, B.; Marta, H.; Bond, V.; Richardson, J.; Ramon, G.; Edvinsson, H.

    1998-01-01

    Information is presented on the benefits of a well-planned information and control systems (I and CS) replacement approach for aging nuclear power generating plants' I and CS. Replacement of an aging I and CS is accompanied by increases in plant profitability. Implementing a structured I and CS replacement with current technology allows improved plant electrical production in parallel with reduced I and CS operations and maintenance cost. Qualitative, quantitative, and enterprise management methods for cost benefit justification are shown to justify a comprehensive approach to I and CS replacement. In addition to the advantages of standard I and CS technologies, examples of new I and CS technologies are shown to add substantial cost benefit justification for I and CS replacements. Focus is upon I and CS replacements at nuclear power plants, however the information is applicable to other types of power generating facilities. (author)

  12. Forecast-Informed Reservoir Operations: Lessons Learned from a Multi-Agency Collaborative Research and Operations Effort to improve Flood Risk Management, Water Supply and Environmental Benefits

    Science.gov (United States)

    Talbot, C. A.; Ralph, M.; Jasperse, J.; Forbis, J.

    2017-12-01

    Lessons learned from the multi-agency Forecast-Informed Reservoir Operations (FIRO) effort demonstrate how research and observations can inform operations and policy decisions at Federal, State and Local water management agencies with the collaborative engagement and support of researchers, engineers, operators and stakeholders. The FIRO steering committee consists of scientists, engineers and operators from research and operational elements of the National Oceanographic and Atmospheric Administration and the US Army Corps of Engineers, researchers from the US Geological Survey and the US Bureau of Reclamation, the state climatologist from the California Department of Water Resources, the chief engineer from the Sonoma County Water Agency, and the director of the Scripps Institution of Oceanography's Center for Western Weather and Water Extremes at the University of California-San Diego. The FIRO framework also provides a means of testing and demonstrating the benefits of next-generation water cycle observations, understanding and models in water resources operations.

  13. An evaluation of inter-organisational information systems development on business partnership relations

    Directory of Open Access Journals (Sweden)

    Williamson, E.A.

    2007-01-01

    Full Text Available Inter-organisational information systems (IOS are being used within SCM to improve businesses processes and to facilitate closer working relations with business partners. However, the technologies themselves impact on this relationship as they allow various levels of information flows, communications, function integration and partner integration.The aim of this paper is to evaluate IOS development influencing partnership integration within Supply Chain Management (SCM by investigating thirteen businesses that use a variety of IOS. IOS are classified into Elementary IOS, Intermediate IOS and Advanced IOS. Organisational variables such as information flows, partner co-ordination and integration, partner trust and confidence are measured against the level of IOS development. Variables such as management commitment, financial costs, system standards and partner resistance are investigated as forces or barriers, and related to different levels of IOS development.This research concludes that IOS development results in increased information flows and coordination which supports the development of trust and confidence in business partners. However, the customer position in the supply chain, whether it be retailer, distributor or manufacturer can influence the use of IOS of its business partners. Also, although IOS allows businesses to source and contact a larger range of business partners, the tendency is for businesses to use a smaller number of partners. This work also shows that IOS development changes a business’s relationship with its partners and moves it towards partnership integration.However, a number of organisational factors impact on this integration. These factors vary with the level of IOS development. Management commitment and showing the requirement for IOS development can act as a positive force in developing IOS or as a barrier against IOS development. Other barriers include resistance from business partners, financial costs, lack of

  14. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  15. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  16. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  17. Probabilistic Weather Information Tailored to the Needs of Transmission System Operators

    Science.gov (United States)

    Alberts, I.; Stauch, V.; Lee, D.; Hagedorn, R.

    2014-12-01

    Reliable and accurate forecasts for wind and photovoltaic (PV) power production are essential for stable transmission systems. A high potential for improving the wind and PV power forecasts lies in optimizing the weather forecasts, since these energy sources are highly weather dependent. For this reason the main objective of the German research project EWeLiNE is to improve the quality the underlying numerical weather predictions towards energy operations. In this project, the German Meteorological Service (DWD), the Fraunhofer Institute for Wind Energy and Energy System Technology, and three of the German transmission system operators (TSOs) are working together to improve the weather and power forecasts. Probabilistic predictions are of particular interest, as the quantification of uncertainties provides an important tool for risk management. Theoretical considerations suggest that it can be advantageous to use probabilistic information to represent and respond to the remaining uncertainties in the forecasts. However, it remains a challenge to integrate this information into the decision making processes related to market participation and power systems operations. The project is planned and carried out in close cooperation with the involved TSOs in order to ensure the usability of the products developed. It will conclude with a demonstration phase, in which the improved models and newly developed products are combined into a process chain and used to provide information to TSOs in a real-time decision support tool. The use of a web-based development platform enables short development cycles and agile adaptation to evolving user needs. This contribution will present the EWeLiNE project and discuss ideas on how to incorporate probabilistic information into the users' current decision making processes.

  18. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  19. QUALITY OF INTER-ORGANIZATIONAL SYSTEM (IOS FRAMEWORK FOR SUPPLY CHAIN MANAGEMENT (SCM: STUDY OF SIX COLLABORATIVE FACTORS FROM SUPPLIER AND CUSTOMER PERSPECTIVES

    Directory of Open Access Journals (Sweden)

    Miloš Mihajlović

    2010-09-01

    Full Text Available This paper has identified a research gap to study how organizations collaborate together to adopt Inter- Organizational System (IOS for Supply Chain Management (SCM. We propose such a framework and then use four theories, namely resource dependency theory, organizational theory, actor-network theory and negotiated order theory, to understand how the framework supports management collaboration and interaction in the adoption of an IOS. This adoption framework is proposed to better study how senior management staff, from both supplier and customer perspectives, collaborate and interact in the IOS adoption process. The framework has been constructed from the literature identifying six major aspects for consideration namely: inter and intra organizational collaboration; strategic management approaches; supply chain design (SCD; business process redesign/reengineering (BPR; information systems (IS / information technology (IT architecture and external environmental factors. From customer and supplier perspectives the adoption of IOS for SCM, makes a significant contribution to knowledge in this field.

  20. Volcanic Origin of Alkali Halides on Io

    Science.gov (United States)

    Schaefer, L.; Fegley, B., Jr.

    2003-01-01

    The recent observation of NaCl (gas) on Io confirms our earlier prediction that NaCl is produced volcanically. Here we extend our calculations by modeling thermochemical equilibrium of O, S, Li, Na, K, Rb, Cs, F, Cl, Br, and I as a function of temperature and pressure in a Pele-like volcanic gas with O/S/Na/Cl/K = 1.518/1/0.05/0.04/0.005 and CI chondritic ratios of the other (as yet unobserved) alkalis and halogens. For reference, the nominal temperature and pressure for Pele is 1760 plus or minus 210 K and 0.01 bars based on Galileo data and modeling.

  1. High-Throughput and Low-Latency Network Communication with NetIO

    Science.gov (United States)

    Schumacher, Jörn; Plessl, Christian; Vandelli, Wainer

    2017-10-01

    HPC network technologies like Infiniband, TrueScale or OmniPath provide low- latency and high-throughput communication between hosts, which makes them attractive options for data-acquisition systems in large-scale high-energy physics experiments. Like HPC networks, DAQ networks are local and include a well specified number of systems. Unfortunately traditional network communication APIs for HPC clusters like MPI or PGAS exclusively target the HPC community and are not suited well for DAQ applications. It is possible to build distributed DAQ applications using low-level system APIs like Infiniband Verbs, but it requires a non-negligible effort and expert knowledge. At the same time, message services like ZeroMQ have gained popularity in the HEP community. They make it possible to build distributed applications with a high-level approach and provide good performance. Unfortunately, their usage usually limits developers to TCP/IP- based networks. While it is possible to operate a TCP/IP stack on top of Infiniband and OmniPath, this approach may not be very efficient compared to a direct use of native APIs. NetIO is a simple, novel asynchronous message service that can operate on Ethernet, Infiniband and similar network fabrics. In this paper the design and implementation of NetIO is presented and described, and its use is evaluated in comparison to other approaches. NetIO supports different high-level programming models and typical workloads of HEP applications. The ATLAS FELIX project [1] successfully uses NetIO as its central communication platform. The architecture of NetIO is described in this paper, including the user-level API and the internal data-flow design. The paper includes a performance evaluation of NetIO including throughput and latency measurements. The performance is compared against the state-of-the- art ZeroMQ message service. Performance measurements are performed in a lab environment with Ethernet and FDR Infiniband networks.

  2. Implementation and operational experience of an integrated fuel information service at the BNFL THORP facility

    International Nuclear Information System (INIS)

    Robson, D.N.; Ramsden, P.N.

    1995-01-01

    BNFL's THORP Plant, which started active operations early in 1994, has contracts to reprocess 7000t(U) of fuel belonging to 33 customers in 9 countries in the UK, Europe and Japan during its first 10 years of operation. Contracts are in place or being negotiated, and further business sought after, with the expectation of extending THORP's operations well beyond the initial 10 years. An integrated data management service, for the fuel storage areas of BNFL's THORP Division, is being implemented to replace several, independent, systems. This Fuel Information Service (FIS) will bring the Nuclear Materials Accountancy and Safeguards Records together with the Operating Records into one database from which all Safeguards Reports will be made. BNFL's contractual and commercial data and technical data on the stored fuel, required to support the reprocessing business, will also be brought into the common database. FIS is the first stage in a project to integrate the Materials Management systems throughout the THORP nuclear recycling business including irradiated fuel receipt and storage, reprocessing and storage of products, mixed oxide fuel manufacture and the conditioning and storage of wastes

  3. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  4. Improvement of Steam Turbine Operational Performance and Reliability with using Modern Information Technologies

    Science.gov (United States)

    Brezgin, V. I.; Brodov, Yu M.; Kultishev, A. Yu

    2017-11-01

    The report presents improvement methods review in the fields of the steam turbine units design and operation based on modern information technologies application. In accordance with the life cycle methodology support, a conceptual model of the information support system during life cycle main stages (LC) of steam turbine unit is suggested. A classifying system, which ensures the creation of sustainable information links between the engineer team (manufacture’s plant) and customer organizations (power plants), is proposed. Within report, the principle of parameterization expansion beyond the geometric constructions at the design and improvement process of steam turbine unit equipment is proposed, studied and justified. The report presents the steam turbine unit equipment design methodology based on the brand new oil-cooler design system that have been developed and implemented by authors. This design system combines the construction subsystem, which is characterized by extensive usage of family tables and templates, and computation subsystem, which includes a methodology for the thermal-hydraulic zone-by-zone oil coolers design calculations. The report presents data about the developed software for operational monitoring, assessment of equipment parameters features as well as its implementation on five power plants.

  5. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    Science.gov (United States)

    Versteeg, Roelof J; Few, Douglas A; Kinoshita, Robert A; Johnson, Doug; Linda, Ondrej

    2015-02-24

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  6. Reducing the operational energy demand in buildings using building information modeling tools and sustainability approaches

    Directory of Open Access Journals (Sweden)

    Mojtaba Valinejad Shoubi

    2015-03-01

    Full Text Available A sustainable building is constructed of materials that could decrease environmental impacts, such as energy usage, during the lifecycle of the building. Building Information Modeling (BIM has been identified as an effective tool for building performance analysis virtually in the design stage. The main aims of this study were to assess various combinations of materials using BIM and identify alternative, sustainable solutions to reduce operational energy consumption. The amount of energy consumed by a double story bungalow house in Johor, Malaysia, and assessments of alternative material configurations to determine the best energy performance were evaluated by using Revit Architecture 2012 and Autodesk Ecotect Analysis software to show which of the materials helped in reducing the operational energy use of the building to the greatest extent throughout its annual life cycle. At the end, some alternative, sustainable designs in terms of energy savings have been suggested.

  7. Fragmented information management weakens sales operations; Fragmentiertes Informationsmanagement schwaecht den Vertrieb

    Energy Technology Data Exchange (ETDEWEB)

    Neumann, Norbert; Gronwald, Heiko [Steria Mummert Consulting, Hamburg (Germany)

    2011-07-15

    Three quarters of all companies that operate in the energy market, which is to say in an increasingly competitive environment, are planning to invest in the long-term improvement of their business processes. Together with the possibilities of microsegmentation, the growing flow of data from smart metering creates opportunities to make differentiated offers to one's more lucrative customers. However this presupposes a high-performing information structure with a company-wide system of data management and traffic control. This system must be capable of processing large data quantities, making data accessible for evaluation and at the same time of collating data from different operating systems while maintaining data consistency. This spells lots of homework for energy supply companies.

  8. Real time explosive hazard information sensing, processing, and communication for autonomous operation

    Energy Technology Data Exchange (ETDEWEB)

    Versteeg, Roelof J.; Few, Douglas A.; Kinoshita, Robert A.; Johnson, Douglas; Linda, Ondrej

    2015-12-15

    Methods, computer readable media, and apparatuses provide robotic explosive hazard detection. A robot intelligence kernel (RIK) includes a dynamic autonomy structure with two or more autonomy levels between operator intervention and robot initiative A mine sensor and processing module (ESPM) operating separately from the RIK perceives environmental variables indicative of a mine using subsurface perceptors. The ESPM processes mine information to determine a likelihood of a presence of a mine. A robot can autonomously modify behavior responsive to an indication of a detected mine. The behavior is modified between detection of mines, detailed scanning and characterization of the mine, developing mine indication parameters, and resuming detection. Real time messages are passed between the RIK and the ESPM. A combination of ESPM bound messages and RIK bound messages cause the robot platform to switch between modes including a calibration mode, the mine detection mode, and the mine characterization mode.

  9. Thermal information regarding the cooldown and operation of liquid argon calorimeters

    International Nuclear Information System (INIS)

    Rucinski, R.A.; Cooper, W.E.; Dixon, K.D.; Krempetz, K.J.; Mulholland, G.T.; Primdahl, K.; Urbin, J.B.

    1993-07-01

    Three liquid argon calorimeters were cooled down and operated as part of the D-Zero detector at Fermi National Accelerator laboratory. The largest vessel contains 248 metric tons of uranium and copper plates and 19 kL (5000 gal.) of liquid argon. The other two vessels are mirror images, each containing 185 metric tons of uranium and stainless steel plates and 12.1 kL (3200 gal.) of liquid argon. The cool down was accomplished by convection heat transfer between boiling liquid nitrogen filled finned heat exchangers and argon gas inside the vessels. Information regarding the general internal geometry of the calorimeters, cool down, operation, and steady state heat loads will be presented

  10. Strategic Communications for Peace Operations: The African Union’s Information War Against al-Shabaab

    Directory of Open Access Journals (Sweden)

    Paul D. Williams

    2018-02-01

    Full Text Available Despite widespread agreement that effective strategic communications are a necessary part of complex peace operations, many missions struggle to generate relevant capabilities and implement effective campaigns. This article analyzes the experiences of the African Union Mission in Somalia (AMISOM as a case study of this problem. Specifically, it examines how the United Nations (UN tried to fill the gap by hiring a consortium of private firms known as the AU-UN Information Support Team (IST to wage a strategic communications campaign against al-Shabaab. The IST’s goal was to drive, as well as communicate, AMISOM’s success, improve the mission’s media presence, and develop a communications strategy. The IST played an innovative and important function for AMISOM but suffered from several significant challenges that reduced its effectiveness. The conclusion therefore identifies four main lessons from AMISOM’s experiences that could improve strategic communications for peace operations.

  11. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-05-09

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  12. An intelligent CAMAC I/O module based on the signetics 8X300 microcontroller

    International Nuclear Information System (INIS)

    Turner, G.W.; Hendricks, R.W.; Oak Ridge National Lab., TN

    1980-01-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfers with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system. (orig.)

  13. An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller

    Science.gov (United States)

    Turner, G. W.; Hendricks, R. W.

    1980-03-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfer with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system.

  14. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-01-01

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  15. Intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller

    Energy Technology Data Exchange (ETDEWEB)

    Turner, G.W.; Hendricks, R.W.

    1979-09-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller was developed. Sixteen 8-bit I/O ports were utilized; eight are dedicated for data transfers with external devices and/or processes, and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer, while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software was developed to operate on the host computer which fully tests all implemented instructions. The device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system. 8 figures, 3 tables.

  16. The Information System for Operational Activity Organization as a Tool for Configuration Management in NPP

    International Nuclear Information System (INIS)

    Manchev, B. L.; Yordanova, V. S.; Nenkova, B. G.

    2008-01-01

    The Configuration Management (CM) is an integrated management process by means of which conformity between design requirements, physical configuration and the plant documentation is ascertained. This conformity is maintained during the entire life cycle of the facility. CM ensures that during the entire operational life of the plant the following requirements are met: The basic design requirements of the plant are established, documented and maintained; The physical structures, systems and components (SSC) of the plant are in conformity with the design requirements; The physical and functional characteristics of the plant are correctly incorporated in the operational documentation and the documentation for repair, as well as in the documents for tests and training; The changes in the design documentation are incorporated in the physical configuration and the operative documentation; The changes in the design are minimized by management process for review according to approved criteria; The changes proposed in the equipment and documentation of the plant are estimated entirely with the purpose of determining their effect and are reviewed and approved by appropriate managing staff before their introduction. The information system for organization of the operational activity (IS OOA) consists of several modules used for storage and retrieval of data for different aspects of the operation of the equipment at the site of Kozloduy NPP, as defects and failures, design requirements and bases, design data and characteristics, tests, life time, maintenance and repair, as well as changes in the design or the design documentation. IS OOA consists of single relational database and provides built-in connections to the database of the SmartDoc system for control of the documentation, as well as to the database for human resources. Central place in IS OOA is taken by the 'Equipment' module while all other modules are connected with the identification data of the structures

  17. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  18. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  19. How Operations in Haiti and Japan Informed Joint Publication 3-08: The Future of Interorganizational Operations?

    Science.gov (United States)

    2013-05-23

    Assistance, Japan Earthquake and Tsunami Update (Tripler Army Medical Center, Hawaii, 2011), 42. 51Karl C. Rohr , Operation Tomodachi: After Action...2010. Rohr , Karl C. Operation Tomodachi: After Action Report and Assessment. 3rd MEB, 2011. Stolberg, Alan G. How Nation-States Craft National

  20. Implementation and Use of Anesthesia Information Management Systems for Non-operating Room Locations.

    Science.gov (United States)

    Bouhenguel, Jason T; Preiss, David A; Urman, Richard D

    2017-12-01

    Non-operating room anesthesia (NORA) encounters comprise a significant fraction of contemporary anesthesia practice. With the implemention of an aneshtesia information management system (AIMS), anesthesia practitioners can better streamline preoperative assessment, intraoperative automated documentation, real-time decision support, and remote surveillance. Despite the large personal and financial commitments involved in adoption and implementation of AIMS and other electronic health records in these settings, the benefits to safety, efficacy, and efficiency are far too great to be ignored. Continued future innovation of AIMS technology only promises to further improve on our NORA experience and improve care quality and safety. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Cassini Information Management System in Distributed Operations Collaboration and Cassini Science Planning

    Science.gov (United States)

    Equils, Douglas J.

    2008-01-01

    Launched on October 15, 1997, the Cassini-Huygens spacecraft began its ambitious journey to the Saturnian system with a complex suite of 12 scientific instruments, and another 6 instruments aboard the European Space Agencies Huygens Probe. Over the next 6 1/2 years, Cassini would continue its relatively simplistic cruise phase operations, flying past Venus, Earth, and Jupiter. However, following Saturn Orbit Insertion (SOI), Cassini would become involved in a complex series of tasks that required detailed resource management, distributed operations collaboration, and a data base for capturing science objectives. Collectively, these needs were met through a web-based software tool designed to help with the Cassini uplink process and ultimately used to generate more robust sequences for spacecraft operations. In 2001, in conjunction with the Southwest Research Institute (SwRI) and later Venustar Software and Engineering Inc., the Cassini Information Management System (CIMS) was released which enabled the Cassini spacecraft and science planning teams to perform complex information management and team collaboration between scientists and engineers in 17 countries. Originally tailored to help manage the science planning uplink process, CIMS has been actively evolving since its inception to meet the changing and growing needs of the Cassini uplink team and effectively reduce mission risk through a series of resource management validation algorithms. These algorithms have been implemented in the web-based software tool to identify potential sequence conflicts early in the science planning process. CIMS mitigates these sequence conflicts through identification of timing incongruities, pointing inconsistencies, flight rule violations, data volume issues, and by assisting in Deep Space Network (DSN) coverage analysis. In preparation for extended mission operations, CIMS has also evolved further to assist in the planning and coordination of the dual playback redundancy of

  2. Contracts and Information Structure in a Supply Chain with Operations and Marketing Interaction

    DEFF Research Database (Denmark)

    El Ouardighi, F.; Erickson, G.; Grass, D.

    2016-01-01

    The objective of the paper is to study how wholesale price and revenue sharing contracts affect operations and marketing decisions in a supply chain under different dynamic informational structures. We suggest a differential game model of a supply chain consisting of a manufacturer and a single...... and the consumer price. The state of the game is summarized in the firms' backlogs and the manufacturer's advertising goodwill. Depending on whether the supply chain members have and share state information, they may either make decisions contingent on the current state of the game (feedback Nash strategy...... if the supply chain members adopt a contingent strategy under a wholesale price contract and a commitment strategy under a revenue sharing contract. © 2016 World Scientific Publishing Company....

  3. Relationship between Jovian Hectometric Attenuation Lanes And Io Volcanic Activity

    Science.gov (United States)

    Menietti, J. D.; Gurnett, D. A.; Spencer, J. R.; Stansberry, J. A.

    2001-01-01

    Within the Galileo plasma wave instrument data a narrow (in frequency) attenuation band is seen in the hectometric (HOM) emission that varies in frequency with system III longitude. This attenuation lane is believed to be the result of near-grazing incidence or coherent scattering of radio emission near the outer edge of the Io torus, i.e., when the ray path is nearly tangent to an L shell containing the Io flux tube. Such a process should, therefore, be enhanced when the Io volcanic activity is increased and the Io flux tube has enhanced density. We have performed a systematic study of the existing Galileo radio emission data in an effort to determine the phenomenology and frequency of occurrence of the attenuation lanes and the association, if any, with published volcanic activity of Io. Our results indicate that the attenuation lanes are present almost all of the time but are enhanced on occasion. The best examples of attenuation lanes occur when Galileo is within approximately 65 R(sub J) of Jupiter and thus are probably more apparent because of the increased signal-to-noise ratio of the radio receivers. The lack of continuous monitoring of Io activity and the lack of known activity on the anti-Earthward side of Io are problematic and make detailed correlation with radio emission very difficult at this time. Nevertheless, if the data are displayed for periods when the spacecraft is within 65 R(sub J) (i.e., for each perijove pass), then the highest-contrast lanes occur on most passes when the Io volcanic activity is also high for that pass. These results support our current understanding of attenuation lane formation and suggest that future efforts can be made to better understand the interaction of HOM emission with the Io flux tube.

  4. booc.io: An Education System with Hierarchical Concept Maps and Dynamic Non-linear Learning Plans.

    Science.gov (United States)

    Schwab, Michail; Strobelt, Hendrik; Tompkin, James; Fredericks, Colin; Huff, Connor; Higgins, Dana; Strezhnev, Anton; Komisarchik, Mayya; King, Gary; Pfister, Hanspeter

    2017-01-01

    Information hierarchies are difficult to express when real-world space or time constraints force traversing the hierarchy in linear presentations, such as in educational books and classroom courses. We present booc.io, which allows linear and non-linear presentation and navigation of educational concepts and material. To support a breadth of material for each concept, booc.io is Web based, which allows adding material such as lecture slides, book chapters, videos, and LTIs. A visual interface assists the creation of the needed hierarchical structures. The goals of our system were formed in expert interviews, and we explain how our design meets these goals. We adapt a real-world course into booc.io, and perform introductory qualitative evaluation with students.

  5. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  6. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  7. Lineations and structural mapping of Io's paterae and mountains: Implications for internal stresses

    Science.gov (United States)

    Ahern, Alexandra A.; Radebaugh, Jani; Christiansen, Eric H.; Harris, Ronald A.; Tass, E. Shannon

    2017-11-01

    stresses and local structural response accounts for the variation and patterns of mountain sizes, shapes, and orientations, along with their isolation and interactions with other features. It also provides a context for the operation and extent of global and regional stresses in shaping Io's surface.

  8. Using social network analysis and agent-based modelling to explore information flow using common operational pictures for maritime search and rescue operations.

    Science.gov (United States)

    Baber, C; Stanton, N A; Atkinson, J; McMaster, R; Houghton, R J

    2013-01-01

    The concept of common operational pictures (COPs) is explored through the application of social network analysis (SNA) and agent-based modelling to a generic search and rescue (SAR) scenario. Comparing the command structure that might arise from standard operating procedures with the sort of structure that might arise from examining information-in-common, using SNA, shows how one structure could be more amenable to 'command' with the other being more amenable to 'control' - which is potentially more suited to complex multi-agency operations. An agent-based model is developed to examine the impact of information sharing with different forms of COPs. It is shown that networks using common relevant operational pictures (which provide subsets of relevant information to groups of agents based on shared function) could result in better sharing of information and a more resilient structure than networks that use a COP. SNA and agent-based modelling are used to compare different forms of COPs for maritime SAR operations. Different forms of COP change the communications structures in the socio-technical systems in which they operate, which has implications for future design and development of a COP.

  9. Sources of expertise in transportation planning, management, and operations: Information received as of September 25, 1987

    International Nuclear Information System (INIS)

    1987-01-01

    The DOE Office of Storage and Transportation Systems is responsible for the development and management of a transportation system to provide all the necessary services for the transportation of the spent fuel and wastes from reactor sites to repositories. DOE/ORO has requested Oak Ridge Associated Universities (ORAU) to assist DOE in developing rosters of sources of transportation expertise in: (1) carrier operations; (2) transportation management, planning, and logistics; (3) transportation equipment; (4) transportation facilities design and operation; (5) vehicle safety; and (6) transportation operations quality assurance; as related to truck, rail, barge, and intermodal transportation. Persons or organizations with experience in shipping of non-hazardous materials, spent nuclear fuel, other radioactive materials, and/or other hazardous materials were included in the information system. A mailed inquiry was sent to over 2300 potential sources of transportation expertise. Responses were received from 207 persons and 254 organizations. Section 1 contains the identification numbers of the individuals and organizations that responded. Section 2 contains identification codes, names, addresses, and phone numbers of each of the individual and organization respondents. The reader can refer to Section 2 for the name and address of the respondents for the identification codes listed for each technical area/experience base in Section 1

  10. Simplified reactive power management strategy for complex power grids under stochastic operation and incomplete information

    International Nuclear Information System (INIS)

    Vlachogiannis, John G.

    2009-01-01

    In the current released energy market, the large-scale complex transmission networks and the distribution ones with dispersed energy sources and 'intelligent' components operate under uncertainties, stochastic and prior incomplete information. A safe and reliable operation of such complex power grids is a major issue for system operators. Under these circumstances an online reactive power management strategy with minimum risk concerning all uncertain and stochastic parameters is proposed. Therefore, new concepts such as reactive power-weighted node-to-node linking and reactive power control capability are introduced. A distributed and interconnected stochastic learning automata system is implemented to manage, in a unified and unique way, the reactive power in complex power grids with stochastic reactive power demand and detect the vulnerable part. The proposed simplified strategy can also consider more stochastic aspects such as variable grid's topology. Results of the proposed strategy obtained on the networks of IEEE 30-bus and IEEE 118-bus systems demonstrate the effectiveness of the proposed strategy.

  11. Information management system for design, construction and operation of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Bolch, M.C. (Duke Power Co. (US)); Jones, C.R. (S. Levy Inc. (US))

    1990-01-01

    This paper describes the principal requirements and features of a computerized information management system (IMS) believed to be a necessary part of the program to design, build and operate the next generation of nuclear power plants in the United States. This way a result of extensive review and input from an industry group studying future nuclear power plant construction improvements. The needs of the power plant constructor, owner and operator for such a computerized technical data base are described in terms of applications and scope and timing of turnover of the IMS by the plant designer. The applications cover the full life cycle of the plant including project control, construction activities, quality control, maintenance and operation. The scope of the IMS is also described in terms of the technical data to be included, hardware and software capabilities and training. The responsibilities of the plant designer for developing the IMS and generating the technical data base is defined as part of the plant process. The requirements to be met include a comprehensive plant data model and computer system hardware and software.

  12. D0 HVAC System Heat Pump Controller Programming, Networking, and Operating Information

    International Nuclear Information System (INIS)

    Anderson, B.

    1999-01-01

    The purpose of this engineering note is to provide the necessary information to setup, program, and network the Electronic Systems USA Heat Pump Controller with the LON network card and Intellution Fix32 to operate properly within the HVAC system at D-Zero. The heat pump controllers are used for local temperature control of the office environments on the fifth and six floors of D-Zero. Heat pump units 1-6 are located in the ceiling of the sixth floor. Heat pump units 7-12 are found in the fifth floor ceiling. Heat pump unit 13 is in the Southeast corner of the fifth floor. Prior to installation the heat pump controller must be properly prepared to operate correctly in the HVAC system. Each heat pump unit must contain firmware (software) version 1.31 to operate properly on the network. Controllers with version 1.30 will not be able to communicate over the LON network. The manufacturer can only update the firmware version. Before installation a series of heat pump setpoints must be manually set using the Intelligent Stat. Connect the Intelligent Stat via the serial cable or wired connection.

  13. A method for risk informing procedures at operating nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, P. F.; Martin del Campo, C., E-mail: pnelson_007@yahoo.com [UNAM, Facultad de Ingenieria, Departamento de Sistemas Energeticos, Paseo Cuauhnahuac No. 8532, Col. Progreso, 62550 Jiutepec, Morelos (Mexico)

    2012-10-15

    The technical approach presented establishes a framework intended to provide the necessary elements for a deployable human performance monitoring program that incorporates insights from plant specific probabilistic risk assessments, human reliability analysis, as well as the development of plant specific human failure data. A human performance monitoring program of this structure would be used to provide the ability to risk inform procedures (e.g., operations or maintenance) to determine the operational risk significance of procedural performance (i.e., precautions, prerequisites, procedure steps), the likelihood of consequential human error dur the performance of the procedure, and the identification of procedure specific barriers to reduce or eliminate consequential human errors. The program would provide the means to assess procedures prior to execution and the means to record and trend human failure events leading to a plant specific human failure database for human activities characterized as pre-initiator. The technical methods and data processing for each of these areas are developed and presented, as well as an example application of an operational procedure error leading to a plant level event (i.e, plant trip). (Author)

  14. On the Benefits and Challenges of Crowd-Sourced Network Performance Measurements for IoT Scenarios

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2018-01-01

    Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability and unce...

  15. Managing the computational chemistry big data problem: the ioChem-BD platform.

    Science.gov (United States)

    Álvarez-Moreno, M; de Graaf, C; López, N; Maseras, F; Poblet, J M; Bo, C

    2015-01-26

    We present the ioChem-BD platform ( www.iochem-bd.org ) as a multiheaded tool aimed to manage large volumes of quantum chemistry results from a diverse group of already common simulation packages. The platform has an extensible structure. The key modules managing the main tasks are to (i) upload of output files from common computational chemistry packages, (ii) extract meaningful data from the results, and (iii) generate output summaries in user-friendly formats. A heavy use of the Chemical Mark-up Language (CML) is made in the intermediate files used by ioChem-BD. From them and using XSL techniques, we manipulate and transform such chemical data sets to fulfill researchers' needs in the form of HTML5 reports, supporting information, and other research media.

  16. XML as a standard I/O data format in scientific software development

    International Nuclear Information System (INIS)

    Song Tianming; Yang Jiamin; Yi Rongqing

    2010-01-01

    XML is an open standard data format with strict syntax rules, which is widely used in large-scale software development. It is adopted as I/O file format in the development of SpectroSim, a simulation and data-processing system for soft x-ray spectrometer used in ICF experiments. XML data that describe spectrometer configurations, schema codes that define syntax rules for XML and report generation technique for visualization of XML data are introduced. The characteristics of XML such as the capability to express structured information, self-descriptive feature, automation of visualization are explained with examples, and its feasibility as a standard scientific I/O data file format is discussed. (authors)

  17. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  18. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  19. The Haskell Programmer's Guide to the IO Monad : Don't Panic

    NARCIS (Netherlands)

    Klinger, S.

    2005-01-01

    Now, that you have started with Haskell, have you written a program doing IO yet, like reading a file or writing on the terminal? Then you have used the IO monad—but do you understand how it works? The standard explanation is, that the IO monad hides the non-functional IO actions —which do have side

  20. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics